Security Aspects
Committed to excellence
White Paper on How to Make State of the Art Electronic Designs
V 1.1
Committed to excellence
2 3| |
Adding security to a device costs extra money, time, power consumption and makes everything worse. The only reason for adding
security to a device is the need to improve marketing – security components help to sell more products. To participate in the evolution
of Industry 4.0, the Internet of Things and cloud technologies to make devices, portfolios and your ecosystem smarter, you have to start
thinking about Security in another way:
One Leak in Security Could be One Leak Too Much
If your products are connected, they are the perfect target to destroy
your company’s reputation. If your products do not fulfill the
requirements of the European General Data Protection Regulation
(GDPR), the impending fine could make your company going
bankrupt.
The battle between companies will start in the second half of 2018
and we expect a wave of legal actions. Last but not least: if a third
party gets control over your products, a damage of life and goods
could be the result.
As the leading high tech distributor we decided not to build a sin-
gle security division. We think it´s not the right way to have a
security specialist on board who is managing the security semi-
conductors and helping our customers from all over the world if
they have need for adding a security solution.
We believe that security will be mandatory for the complete design,
in all layers, regarding data transmission, data processing and data
storage. It affects hardware, software and virtual services. Having
in mind that one leak, one little mistake, one delay of making an
update could destroy human life, causing a commercial collision
and destroy your business from one moment to the next. We take
security very seriously and added this way of thinking to all our
product managers in all product divisions.
When it comes to security, there is no one-size-fits-all solution.
Thorough risk analyses have to be carried out to identify the spe-
cific threats to individual systems. In most cases, secure identities
are exposed to a high level of threat as they are used to protect
know-how and intellectual property, safeguard the integrity of sys-
tems and protect stored data and data distributed over networks.
If you thought SECURITY is only useful for marketing reasons,
then we hope that this security brochure will change your point
of view. It should make you aware about some more aspects and
motivate you to make contact with us to talk about your individ-
ual needs and tailored solutions.
Enjoy reading and discover new aspects of security!
Content
General Data Protection Regulation . . . . . . . . . . . . . . . 4
Cryptography in a Nutshell . . . . . . . . . . . . . . . . . . . . . 6
Encryption Technologies – The Key to Security . . . . . . . 8
Security ICs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Wireless Data Transport . . . . . . . . . . . . . . . . . . . . . . . 16
Wi-Fi 22
Bluetooth EDR vs. Bluetooth LE vs. Bluetooth 5 24
Bluetooth Mesh Networking 26
Thread vs. ZigBee vs. other 2.4 GHz Mesh Solutions 28
Security at Cellular Wireless Technologies 30
Data Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Silent Data Corruption – The Neglected Hazard 32
Intel’s Security Solutions – Designing for Data Integrity 34
RAID – Redundant Array of Independent Disks 35
ECC – Error Correction Code 35
What Needs to be Borne in Mind when
Selecting Storage Media? 36
Apacer´s Security Solutions 38
Swissbit´s Security Solutions 40
Transcend's Hardware-based AES Solution 42
Seagate´s Security Solutions 45
Data Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Central Processing Unit Security 46
Security on ARM Based Embedded Boards 58
Security Features on Standard x86 Based Boards 60
Secure Software Solution from Advantech, Acronic, McAfee 64
Advantech Complete Bundle Solution – SUSI 67
Secure Power Supply 68
The Defenses of the Standard Microcontroller 70
Security in General Purpose Microcontrollers 72
Security of Automotive MCUs 78
Security of In-Circuit-Programmer for Off-Site Production 84
IoT Connected Applications with Speakers . . . . . . . . . 86
Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Avoiding Visual and Printed Spy on Displays, Keyboards and
Number Pads 88
RUTRONIK EMBEDDED 93
Secure Entry Systems 94
Consult – Know-how. Built-in.
The Technical Competence from RUTRONIK
Worldwide and individual consulting on the spot: by competent
sales staff, application engineers and product specialists.
Logistics – Reliability. Built-in.
The Delivery Service from RUTRONIK
Innovative and flexible solutions: from supply chain management
to individual logistics systems.
Components – Variety. Built-in.
The Product Portfolio from RUTRONIK
Wide product range of semiconductors, passive and electro-
mechanical components, displays & monitors, boards & systems,
storage and wireless technologies for optimum coverage of
your needs.
Quality – Security. Built-in.
Quality Management without Compromise
The integrated management system (IMS) encompasses
quality control, environmental protection and occupational
health and safety.
Our Product Portfolio
Our Innovation Centers
Committed to Excellence
Semiconductors
Passive Components
Electromechanical
Components
Boards & Systems
Displays & Monitors
Wireless Technologies
Storage Technologies
Get Your
Rutronik App
www.rutronik.com www.rutronik24.com
Follow us
www.facebook.com/rutronik
https://twitter.com/Rutronik
www.youtube.com/user/Rutronik24
https://rutronik-tec.com
www.linkedin.com/company/rutronik
General Data Protection Regulation
. . . . Article 32 – Security of Processing
4. The controller and processor shall take steps to ensure that
any natural person acting under the authority of the con-
troller or the processor who has access to personal data does
not process them except on instructions from the controller,
unless he or she is required to do so by Union or Member
State law.
Article 83 – General Conditions
for Imposing Administrative fines
4. Infringments of the following provisions shall, in acccordance
with paragraph 2, be subject to administrative fines up to
10 000 000 EUR, or in the case of an undertaking, up to
2 % of the total worldwide annual turnover of the preceding
financial year, whichever is higher:
a) the obligations of the controller and the processor pursu-
ant to Articles … 25, …32, …;
Article 25 –- Data Protection by Design and by Default
1. Taking into account the state of the art, the cost of implemen-
tation and the nature, scope, context and purposes of processing
as well as the risks of varying likelihood and severity for rights
and freedoms of natural persons posed by the processing, the con-
troller shall, both at the time of the determination of the means
for processing and at the time of the processing itself, implement
appropriate technical and organisational measures, such as pseudo-
nymisation, which are designed to implement data-protection
principles, such as data minimisation, in an effective manner and
to integrate the necessary safeguards into the processing in order
to meet the requirements of this regulation and protect the rights
of data subjects.
2. The controller shall implement appropriate technical and organ-
isational measures for ensuring that, by default, only personal data
which are necessary for each specific purpose of the processing
are processed. That obligation applies to the amount of personal
data collected, the extent of their processing, the period of their
storage and their accessibility. In particular, such measures shall
ensure that by default personal data are not made accessible with-
out the individual's intervention to an indefinite number of natu-
ral persons.
Article 32 – Security of Processing
1. Taking into account the state of the art, the costs of implementa-
tion and the nature, scope, context and purposes of processing
as well as the risk of varying likelihood and severity for the rights
and freedoms of natural persons, the controller and the processor
shall implement appropriate technical and organisational mea-
sures to ensure a level of security appropriate to the risk, includ-
ing inter alia as appropriate:
a) the pseudonymisation and encryption of personal data;
b) the ability to ensure the ongoing confidentiality, integrity,
availability and resilience of processing systems and services;
c) the ability to restore the availability and access to personal
data in a timely manner in the event of a physical or technical
incident;
d) a process for regularly testing, assessing and evaluating the
effectiveness of technical and organisational measures for
ensuring the security of the processing.
2. In assessing the appropriate level of security account shall be
taken in particular of the risks that are presented by process-
ing, in particular from accidental or unlawful destruction, loss,
alteration, unauthorised disclosure of, or access to personal data
transmitted, stored or otherwise processed.
3. Adherence to an approved code of conduct as referred to in
Article 40 or an approved certification mechanism as referred
to in Article 42 may be used as an element by which to demon-
strate compliance with the requirements set out in paragraph 1
of this Article
How to Protect Your Business
The effects of this law for your electronic product design are
hard to predict. We recommend using the most secure com-
ponents to avoid getting accused by your competitors later on.
Some aspects about how to choose the right technologies to be
on the safe side (as best as possible by today) can be found on
the next pages.
If you want to sell your electronic products within the European Union, you should be aware of this new law about the protection of
personal data. This law is already valid and will be mandatory to follow from May 2018 onwards. It is important to know that some courts
of justice have already issued judgments regarding the definition of personal data.
For example all data which enters or leaves the motor control box of a car and the levels of all operating fluids are defined as personal data –
even though they are indirectly personal and do not clearly belong to a specific person. In addition the meaning of “state of the art” was
defined by the German Federal Office for Information Security (BSI) as the best available technology or products to satisfy the require-
ments of the law. We recommend reading the complete GDPR, but here are some quotes as extracts:
4 5| |
Cryptography in a Nutshell
The Kerckhoffs‘ Principle
In cryptography, Kerckhoffs'
principle (also called Kerck-
hoffs' desideratum, Kerckhoffs'
assumption, axiom, or law) has
already been stated by Dutch
cryptographer Auguste Kerck-
hoffs in the year 1883 and is
still valid:
A cryptosystem should be secure even if everything about the
system, except the key, is public knowledge
■ It is much more difficult to keep an algorithm secret than a key
■ It is more difficult to replace one compromised algorithm with
another than a compromised key
■ Secret algorithms can be reconstructed by reverse engineering
from software or hardware implementations
■ It is easier to hide a backdoor in "secret" encryption methods
■ Bugs in public algorithms are more easily discovered when as
many people as possible deal with them
This principle is used in all relevant cryptographic methods –
independent if they are symmetric, asymmetric or hybrid.
Most Popular Cryptographic Algorithms
Symmetric Cryptographic Algorithms
■ Encryption and decryption with one single key
(Secret-Key-Cryptography)
■ Key must be present during encryption and decryption
■ Key must be exchanged in advance (side channel)
■ Keys must be stored safe
■ 128 bit keys are considered as safe, 256 bit is considered as future
proof
■ Fast encryption method
■ Examples of algorithms: AES, Rijndael, Blowfish, RC4/5/5a/6,
3DES, DES, A5, CAST, IDEA
■ Examples of applications: WPA2 (IEEE802.11i), IPsec-VPN, OpenSSL
There are three security concerns where cryptography is used: Authentication, Integrity and Confidentiality.
To choose the right technology for cryptography, you should be aware about some general understanding and differences:
Picture 1: Auguste Kerckhoffs
Asymmetric Cryptographic Algorithms
■ Encryption and decryption with different keys
(Public-Key-Cryptography)
■ Generation of a pair of keys (private key and public key)
■ Private key does not need to be exchanged
■ Encrypt data with public key, decrypt data with private key
■ Sign data with private key, check signature with public key
■ Based on one-way function
■ Trapdoor function (easy to compute in one direction, yet
difficult to compute in the opposite direction as long as
no “Trapdoor” information is known
■ Potential attack by reversing the one-way function
(not by trying to find out the key)
■ Only 2048 Bit Keys (RSA) or 256 Bit keys (ECC) considered to
be sufficient
■ Slow encryption method (RSA is approximately 1000 times
slower than symmetric encryption like AES)
. . . .
■ Examples of algorithms: RSA, ECC
(eliptic curve cryptography), Diffie-Hellman, ElGamal
■ A successful man-in-the-middle attack at key-exchange could
make the system useless
Hybrid Cryptographic Algorithms
■ A hybrid algorithm uses asymmetric session key creation
algorithms, but a symmetric algorithm to encrypt the data.
At the end it´s a compromise using the biggest advantage
of both methods
■ Examples of algorithms: SSL, TLS
■ Examples of applications: very often used to protect internet
sessions. The SSL/TLS is used on top of TCP/IP, but below the
application layer for websites, E-Mail or file transfer.
Very often the application protocol is renamed when it´s based
on a cryptographic protected session – for example HTTPS is
the encrypted version of HTTP
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are
both hybrid encryption protocols for a safe and secure data transfer
via the internet. SSL was the former protocol. After SSL 3.0, TLS
1.0 followed as successor. (TLS 1.0 is sometimes also known as SSL
3.1.) Currently the latest standard is TLS 1.3.
SSL and TLS have basically two tasks. The first is to guarantee the
reliability of the connected server through a certificate. The second
is an encrypted data exchange between client and server.
Hash Cryptographic Algorithms
■ The algorithm uses the net data to calculate a fixed size of another
data packet, called hash value (128 bit to 512 bit are usual)
■ The hash value is always unique. The algorithm will not create
the same hash value when another data source is used
■ It´s not possible to calculate the net data when only having the
hash file
■ Examples of algorithms: SHA, CRC, MD4, MD5, MD2, Tiger,
RIPEMD
■ Examples of applications: testing the integrity of files, making
passwords more secure, creation of digital signatures and it'a also
part of asymmetric algorithms
Plain text Plain text
DecryptionEncryption
Public Key Private Key
RecipientSender
Encrypted text
6 7| |
Encryption Technologies
The Key to Security
Security is Always a System
The issue of security is often neglected in relation to embedded
systems especially. The result: Industrial spies can use hacked
devices to penetrate the entire corporate network, gain access
to the company‘s intellectual property (IP) and business secrets,
and manipulate data. Users of smart home devices might unin-
tentionally disclose information to potential thieves through their
security cameras, or even open doors and windows for them by
way of automated control systems. Automobiles are also subject to
virtually infinite vulnerabilities thanks to autonomous driving and
over-the-air firmware updates. When such cases become known,
customers‘ trust in the device – or even the entire business – is lost.
In view of this, encryption should be top of the priority list for all
manufacturers of connected products.
In order to understand encryption, it is helpful to consider what
its aims are. These are focused on three key areas: authenticity,
confidentiality, integrity. When a user wirelessly connects mul-
tiple products in his home, for example, it is important that only
authorized products can join the network, and that both the data
in the network and the complete system are protected.
That is to say, protection must be in place against unauthorized
access to the network (authenticity), data tapping (confidentiality)
and manipulation (integrity). State-of-the-art cryptography cov-
ers all three aspects. It is available in two fundamentally different
modes: symmetric and asymmetric encryption.
Symmetric Encryption
In symmetric encryption, the same key is used for both encryp-
tion and decryption. The best-known and most frequently used
encryption method is AES (Advanced Encryption Standard). AES
works with either 128, 192 or 256 bit keys. Even 128 bit AES keys
are classed as secure according to the current state of the art.
It is noteworthy that the principle of modern cryptography formu-
lated by Auguste Kerckhoffs in 1883 still holds true: The security
of an encryption method is founded on the secrecy of the key and
not on the secrecy of the algorithm. This is particularly important
in relation to a symmetric encryption method such as AES, as
the same key is used on both ends (encryption and decryption).
If the key is known, or is disclosed, the entire encryption process
is nullified.
Consequently, the greatest challenge of AES lies in the manage-
ment of the keys. In this, above all it must be ensured that the
keys are generated using a genuine random generator; that they
are deposited in a secure element; and that they cannot be inter-
cepted the first time they are transferred.
Threats resulting from new technologies regularly make the headlines – whether thefts of vehicles with Keyless Go, illicit surveillance scandals,
data theft, disclosure of passwords on the Internet, or phishing attacks. However, the greatest damage is in most cases not suffered by the users:
Once negative publicity has stuck to a product, or a manufacturer, it becomes a serious threat to the business. Encryption technologies
offer comparatively cost-effective protection. When handling personal data, encryption is required by data protection laws in any case.
Asymmetric Encryption
Asymmetric encryption always uses two different keys: a private
key and a public key. They are always generated as a pair. The pri-
vate key remains permanently with the originator of the keys, while
the public key goes to the receiving party. The recipient can use the
public key to encrypt messages which can only be decrypted with
the linked private key. The private key can also generate a signa-
ture by which the recipient can uniquely identify the sender using
the linked public key.
Asymmetric encryption is based on oneway mathematical func-
tions. They must be as simple as possible to calculate, but very
complex to reverse. Continually increasing computing power is also
steadily improving the ability of computers to calculate complex
reversing functions. To ensure adequate security, the keys therefore
must have a certain length. Keys with 2048 bits, such as RSA 2048,
are currently classed as secure. Because encryption and decryption
speeds decrease as keys get longer, asymmetric methods are only
practical for handling small amounts of data.
Elliptic Curves for More Speed
An alternative to this conventional asymmetric encryption is Ellip-
tic Curve Cryptography (ECC). It is based on the same approach,
but utilizes points on elliptic curves. That makes computing opera-
tions much more complex, so ensuring that even 256 bit keys offer
a secure level according to the current state of the art. And ECC
256 does not take much more time than comparably secure sym-
metric methods.
Different encryption ICs create a secure smart home in every respect. (Source: Infineon)
Network
OPTIGA™ TPM
Server
Battery, Disposables
Basic Peripheral
Gateway
End Node
Uninterruptible Power Supply
OPTIGA™ Trust B/E
OPTIGA™ TPM
OPTIGA™ Trust X
OPTIGA™ Trust B
XMC™
MCU
XMC™
MCU
TRX
OPTIGA™
Trust B/E
XMC™
MCU
OPTIGA™ TPM
8 9| |
Encryption Technologies
The Key to Security
Hybrid Encryption Eliminates Disadvantages
If symmetric encryption of user data is chosen, but the security
it offers is not adequate, it can be improved by means of hybrid
encryption. In this, the symmetric key is sent again in encrypted
form by means of an asymmetric public key. This means only the
authorized recipient is able to decrypt the symmetric key with the
matching private key.
At the same time, the sender of the symmetric key can use his
private key to generate a signature which enables the recipient to
uniquely identify him using the matching public key. Once these
keys have been exchanged and decrypted, the foundation has been
laid for symmetrically encrypted communications.
This combination method eliminates the disadvantages of the two
separate methods – namely the insecure key transfer of symmetric
encryption and the slower speed of asymmetric encryption.
Hardware or Software?
Each encryption method can be implemented by software or hard-
ware. Software-based encryption entails the major disadvantage
that the program is not an autonomous self-contained unit, but is
always dependent on its environment, such as the operating sys-
tem. It is susceptible to errors and attacks as a result. And there is
another negative: As the microcontroller or processor of an embed-
ded system additionally has to handle the complex encryption and
decryption, loss of performance is inevitable.
The opposite case is represented by encryption using specially
developed ICs. Their sole function is encryption, so there is no
performance loss. Many encryption ICs are additionally protected
against physical attacks. The security of those components – and
also of the keys – is thus independent of the security of the over-
all system.
Encryption ICs in different designs meet the requirements of a
range of applications: Simple authentication chips, such as from
the Infineon Optiga Trust series, use asymmetric encryption (ECC
163), and are good choice for the authentication of original acces-
sories in consumer electronics for example. The Optiga Trust E
series with ECC 256 and SHA 256 assures authentication of medi-
cal equipment, in smart homes, in industry, or in cloud computing
authentication for license management for example.
. . .
The Optiga Trust P series with ECC 521 and RSA 2048 features
a Java-based operating system, in which dedicated applets can
be programmed. The STSAFE (ECC 384, SHA 384, AES 256)
products from STMicroelectronics also offer the highest protec-
tion, based – among other features – on secure authentication,
encrypted communications, secure depositing of keys, and pro-
tection when running firmware updates.
Standardized Trusted Platform Modules (TPMs) combine highly
complex encryption and secure depositing of large numbers of
keys and signatures with protection against physical readout of
the data stored in them. They are offered by Infineon for example.
Encrypted Smart Home
A simple practical example illustrates the use of encryption ICs:
In a smart home, simple authentication chips such as the Optiga
Trust SLS ensure that only authorized devices – such as shutter
controls or surveillance cameras installed by the user – are able
to log in to the central smart home gateway.
An STSAFE Secure microcontroller encrypts the communications
between the cameras and the central gateway. A TPM in the cen-
tral gateway assures key storage, firmware updates, and the trans-
fer of all data to the Cloud. As a result, the homeowner can be
certain that authenticity, confidentiality and integrity are assured.
ST provides customers and partners with a broad portfolio of security building
blocks, to help protect everything from branded products and intellectual
property to manufacturing processes, production equipment and access
control in the workplace.
ST offers security solutions that are adapted to the needs of your application,
covering all market needs with a range of exible and scalable secure
solutions.
ST offers the security you need
to protect your application
STM32
STM32 family of general-purpose microcontrollers with
advanced security features:
• Security monitoring and services isolation
• Secure rmware upgrade
• Cryptographic accelerators for selected families
• HW independent cryptographic libraries
STSAFE secure elements, connected to general purpose
MCU, and designed to ensure strong secure key storage,
device identity, system and network integrity:
• Authentication
• Secure connection establishment
• Secure storage
• Certied & tamper resistant
• LPWAN secure connection & keys distribution
www.st.com/stm32 www.st.com/stsafe
Advertisement: STMicroelectronics10 11| |
Security ICs
Secure identities are established using secret keys and cryptographic processes. They are fundamental for the entire chain of security
measures required to protect your application.
The following security solutions are built to provide secured information transfer for a wide range of application areas, using security
solutions like authentication and data management services, secured key transfer, host verification, secured boot and many more.
Type Security Level Functionality
NVM
(Data) Cryptography Type of Host System
Inter-
face Package
OPTIGATM Trust B SLE95250 Basic Authentication 512 Byte ECC131 MCU without OS / proprietary OS / RTOS SWI PG-TSNP-6-9
OPTIGATM Trust X CC EAL 6+ Connected device security 10 kByte ECC384 MCU without OS / proprietary OS / RTOS, Embedded Linux I
2C -
OPTIGATM Trust P SLJ 52ACA CC EAL 5+ Programmable 150 kByte ECC251 RSA2K MCU without OS / proprietary OS / RTOS, Embedded Linux UART VQFN-32
OPTIGATM Trust E SLS 32AJA CC EAL 6+ cost effective security for high value goods 3 kByte ECC 256
MCU without OS /
proprietary OS / RTOS I
2C USON-10-2
OPTIGATM TPM SLB 9645 - Security Cryptocontrollerfor Trusted Platform Modules 6 Kbyte ECC256 RSA2K
Embedded Linux, Windows
/ Linux I
2C TSSOP-28, VQFN-32
OPTIGATM TPM SLB 9660 CC EAL4+ moderate
Security Cryptocontrollerfor
Trusted Platform Modules 6 Kbyte ECC256 RSA2K Embedded Linux / Windows LPC TSSOP-28, VQFN-32
OPTIGATM TPM SLB 9665 CC EAL4+ moderate
Security Cryptocontrollerfor
Trusted Platform Modules 7206 Byte ECC256 RSA2K Embedded Linux / Windows LPC TSSOP-28, VQFN-32
OPTIGATM TPM SLB 9670 CC EAL4+ moderate
Security Cryptocontrollerfor
Trusted Platform Modules 6 kBbyte ECC256 RSA2K
Embedded Linux / Windows /
MCU without OS /
proprietary OS
SPI VQFN-32
STSAFE-A1SX CC EAL5+ Authentication, data integrity, confidentiality 6 kByte AES-128 Sigfox devices I
2C SO8N 8, UFDFPN 8
STSAFE-A100 CC EAL5+ Authentication 6 kByte
ECC256/384, ECHD,
ECDSA256/384,
AES-128/256
MCU without OS /
proprietary OS I
2C SO8N 8, UFDFPN 8
STSAFE-J100 CC EAL5+ Authentication, secure data storage, cryptographic services 80 kByte
TRNG, DRNG,
DES/3DES, ECC, AES
Java Card operating system /
VGP 2.1.1 I
2C VFQFPN32
Security ICs from Infineon and STMicroelectronics
STSAFE-A is the optimized secure element for device protection in Internet of Things environments
■ State-of-the-art security relying on
CC EAL5+ hardware
■ Security functions
■ Authentication
■ Encryption
■ Secure channel
■ Firmware upgrade
■ USB Type-C standard compliant
■ Full turnkey solution with secure OS and
personalization services
■ Optimized for small platforms
■ Easy integration by using libraries
Have you ever thought about if your secret keys are stored/hidden safe enough? Attackers could easily gain access to valuable software
code, key material or sensitive data. If you are using so far just a common MCU or module with no special hardware crypto functions,
anybody could hire a company like Circuit Engineering Company Limited or Mikatech Innovative Limited to get your software knowl-
edge or the data stored inside. Already the name of their homepages “ic-cracker.com” or “break-ic.com” gives a hint in what kind of busi-
ness they are working
What if Your Secure System was Designed from Insecure Components?
In the end, the overall security of your system is determined
by the weakest link. Even if you implement a protocol which is
probably secured, your system could be broken if the key can be
easily extracted from the hardware by simple physical attacks.
Therefore, if you do not already use a Security MCU, we recom-
mend to integrate a hardware Crypto IC into your design. The
purpose of a hardware security IC is to act as the keystone of a
security subsystem, eliminating the need to protect the rest of the
system with hardware or software security measures.
A crypto and authentication IC keeps your secret keys hidden
against attacks. They are tamper-resistant and hardened against
physical attacks through different measures like an active shield-
ing, randomized layout and mechanisms which force to stop
operation if they detect abnormal conditions. They can further-
more be used as brand protection and enable secured boot and
secured DFU (Device Firmware Update).
An opponent with unlimited ressources in terms of time, equip-
ment and knowledge can even break any chip protection. The
question is how practical it would be. If it takes too much time
and financial ressources well beyond the expected gain, then your
defense has won. IC attackers would most probably switch to other
products rather than spending time and money on breaking your
IC.
So if you want to be on the safe side, think about integrating a secu-
rity hardware IC, so you have a comprehensively secured system/
product. And last but not least, integrating a security IC means also
that you do not have any performance losses as your microcon-
troller has not to do the complex de- and encrypt tasks.
12 13| |
Security ICs
STMicroelectronics STSAFE Embedded Security Solutions
Running on a Common Criteria EAL5+ platform, STSAFE-A is a highly secure authentication solution whose security is certified by
independent parties. Its command set is tailored to address strong authentication, establish a secure channel in the scope of a TLS session,
verify signatures, and offer secure storage as well as decrement counters for usage monitoring. It is particularly well suited for applica-
tions heavily exposed to fraud and counterfeiting attacks, such as printers, game controllers, phone accessories, and Internet of Things
networks and devices. By offering a complete solution ranging from an internally-developed secure operating system embedded in the
security microcontroller, example code for integrating solutions in the applicative environment, and personalization services for storing
confidential customer data in the secure microcontroller, ST offers seamless integration of security measures for customers who might
not be experts in secure systems.
Infineon OPTIGA™ Embedded Security Solutions
Infineon OPTIGA™ embedded security solutions are scalable, easy-to-integrate security for your embedded project. The OPTIGA™ Trust
family includes turnkey products for smaller platforms as well as programmable solutions, while OPTIGA™ TPM (Trusted Platform
Module) products are ideal for embedded PC, mobile and computing applications. All OPTIGA™ TPM products comply with the Trusted
Computing Group (TCG) standards.
The OPTIGA™ Trust product family offers a full range of secu-
rity chips to address individual needs in the field of embedded
authentication and brand protection and further security applica-
tions. Whether you are looking for a turnkey security chip enabling
fast and easy integration or a feature-rich programmable solution,
OPTIGA™ Trust has the perfect match for your business model.
OPTIGA™ TPM (Trusted Platform Module) offers a broad portfo-
lio of standardized security controllers to protect the integrity and
authenticity of embedded devices and systems. With a secured key
store and support for a variety of encryption algorithms, OPTIGA™
TPM security chips provide robust protection for critical data and
processes through their rich functionality.
OPTIGA™ TPM security controllers are ideal for platforms running
both Windows and Linux (and its derivatives). Based on Trusted
Computing Group (TCG) standards, they support the TPM 1.2 or
the latest innovative TPM 2.0 standard.
Rutronik can offer Infineon OPTIGA™ solutions as a chip to make
your own embedded system build on your own PCB, as well as
offering ready to use embedded boards and standard mainboards
with already having Infineon OPTIGA™ technology on board.
The right security for IoT
Protect your embedded project with the OPTIGA™ product family
Security is more than data protection – in many cases, security measures also enable new business models and
services such as remote feature management. However, performance and security requirements vary considerably from
one embedded project to another.
To reflect this diversity, our proven OPTIGA™ product family allows you to match security functionality to your specific
application needs. Designed for ease of integration, this proven, scalable family ranges from authentication solutions
(OPTIGA™ Trust family) to advanced implementations based on our Trusted Platform Modules (OPTIGA™ TPM).
Check out our OPTIGA™ product family and make your
embedded solution a secured success:
www.infineon.com/iot-security* Based on certified HW ** Code & Data
x
Done by IFX
X Customer Implementation, support by IFX
Family OPTIGA™
Trust B
OPTIGA™
Trust E
OPTIGA™
Trust X 1)
OPTIGA™
Trust P
OPTIGA™
TPM
Type SLE 95250 SLS 32AIA SLS 32AIA020x SLJ 52ACA SLB 96xx
Image
Security Level Basic CC EAL 6+ * CC EAL 6+ * CC EAL 5+ CC EAL 4+
Functionality Authentication Authentication Connected device security Programmable TCG standard
NVM (Data) 448 Byte 3 kByte 10 kByte 150 kByte ** 6 kByte
Cryptography – Private key
stored in secure HW
ECC163 ECC256 ECC384 ECC521 , RSA2K ECC256, RSA2K
Type of Host System MCU without OS / proprietary OS / RTOS
Embedded Linux
Windows / Linux
Interface SWI I²C I²C UART I²C, SPI, LPC
System Integration X X X X Platform vendor
OPTIGA™ Embedded Security Family
1) Launch Q1/2018
Advertisement: Infineon Technologies14 15| |
Wireless Data Transport
Wireless communication is used nowadays in many different
applications, accepted by users, and trusted as a secure way of
communication. Security risks like cable breaks, cable oxidation,
loose connection, cable fire, theft of copper cable, vandalism or
reconnection and monitoring a communication are more unlikely
than at wired solutions. Nevertheless there are still some security
aspects of different wireless technologies which should be known.
. . .
For example: the 868 MHz band has a bandwidth of 600 kHz, while
the 2.4 GHz band has space for ca. 85 MHz. That means you can
in general establish more data channels in parallel at 2.4 GHz, just
for the case that some frequency areas are already used by others.
The 868 MHz band has a more strict regulated duty cycle than
the 433 MHz band. That means you have restrictions on the dura-
tions of sending data. On the one hand this could be a problem if
your duty cycle capacity is already being used but you need to send
another important data packet. If you think it would be better to use
433 MHz because of the missing restriction, then think about what
could happen if you send this important further data packet when
another application is already using this frequency channel all the
time – for example a 433 MHz headphone system, which streams
audio on this channel permanently.
If you will use a popular wireless standard, many of these aspects have
already been solved. 2.4 GHz technologies based on IEEE802.15.4
specification (like ZigBee, Thread and some others) are using 16
channels with 5 MHz modulation per channel. That makes them
robust against small signal disturbances. Wi-Fi is using 20 MHz
per channel, which is even more robust. Classic Bluetooth is using
the same frequencies splitted into 79 channels with 1 MHz each. To
make sure that the connection will be robust as well, it changes the
used channel 1600 times per second. With this strategy Bluetooth
makes sure not to stay on a busy channel. Bluetooth Low Energy
doesn´t change the channel without having detected a disturbance,
but it uses 2 MHz per channel as a compromise.
In case you want to connect your device to a smartphone, you have
to take a supported protocol like Bluetooth, Wi-Fi, ANT or NFC.
Jamming Detection
Jamming devices could be found in dark market places and they
could be made by you easily. A jamming device is transmit-
ting random codes with as much power as possible on the same
frequency spectrum of the wireless connection which should be
disturbed. The use of a jamming device is forbidden in most cases.
It could be used to avoid closing a car on the supermarket parking
lot or to disturb the alarm system of a house. For security reasons
you should make sure that the transmission of the data was suc-
cessful. Therefore you should implement an acknowledgement
feature in your communication process. Further there are wireless
products available in the market, which have already an imple-
mented jamming detection feature. All cellular and GNSS modules
(GPRS, UMTS, LTE, etc.) from the manufacturer Telit have this
feature. In the case of detecting a jamming signal which prevents
the connection to the mobile network operator base station, the
modules are able to react locally with emergency measures.
Unidirectional vs . Bidirectional
Unidirectional and bidirectional describe the way two electronic
devices communicate. Unidirectional means that there is only
one receiver on one side and a transmitter on the other. A typical
example is a car key. The car key is able to send the orders Open/
Close etc. so the car receives the information, but there is no com-
munication from the car towards the key to tell e.g. that the com-
mand has been received. Another example is the radio broadcast:
on one side you have the speaker as a transmitter and on the other
the audience with their receivers. Bidirectional communication
contains a receiver and transmitter on both sides – a so called
transceiver. This configuration allows a duplex communication.
But if your devices only have to communicate with each other, you
have also the opportunity to create your own proprietary protocol.
From security aspects this has some advantages: you would have full
control inside your own network. There is no device from another
company which could interrupt or cause delays. That´s the reason
why most of the wireless smoke detector systems in public buildings
are using a secret proprietary protocol from the vendor. Another
advantage is that it is not very attractive for a hacker to invest a lot
of time to hack your device. Most hackers more likely tend to look
for bigger ecosystems to cause damage, because the commercial
outcome of a successful Zero-Day-Exploit Attack (ZETA) would be
much higher. This advantage could turn into a disadvantage as well:
if you make a mistake, you have to solve it and pay the bill alone. If
you choose a standardized protocol, there will be a big community
who takes care about making updates, patches and fixes if a security
problem becomes public.
Conclusion: If you use a standardized wireless technology, like
Bluetooth for example, you cannot choose the features by yourself
and you have to trust the community. But if you want to create your
own proprietary wireless technology, you should be aware about each
of the seven layers of the ISO-OSI-model in communication system.
Our recommendation is to check the regulations at the ETSI website
to be aware about the advantages and disadvantages of the different
ISM-Bands. After this, you should look for established and proofed
software from experienced specialists. In addition to the well-known
wireless technologies, Rutronik can also help to get an overview of
the features from protocols like RFDP8, ShockBurst, WDP, Gazell,
SNAP® or the smartphone supported ANTTM and ANT BLAZETM.
There are three security reasons to use a bidirectional transceiver:
after sending your data you can receive an acknowledgement data
packet to make sure that your data has been received successfully.
This ensures that your communication partner has been in range
and no disturbances occurred. The second reason to use a trans-
ceiver is the possibility to exchange security keys in order to make
sure that you are sending the data to the right subscriber. You
can avoid man-in-the-middle attacks and you can establish an
encrypted connection to avoid that anybody else can listen. The
third reason is the already mentioned possibility to make jamming
detection by using the receiver before transmitting data. Indepen-
dent of the security aspects there are further advantages of using a
transceiver, like adjusting the transmit power level to save energy
and an automatic resend of data packets in case of reception prob-
lems.
General Security Strategy Regarding
Frequencies and Protocols
Mobile network operators have bought own frequency ranges to offer
GSM, LTE and other services to you. For all other kind of common
used wireless technologies you will use licensed free and public avail-
able frequencies – so called ISM-bands (Industrial, Scientific, Medi-
cal Bands). Bluetooth, Wi-Fi, ZigBee, ANT, SigFox, LoRa, Thread,
RFID, NFC and all the other known technologies are working within
these frequency areas. The three most popular ISM-bands in Europe
for standard applications are 433 MHz, 868 MHz and 2.4 GHz. You
should be aware that the allowed transmission power, the available
bandwidth and the allowed duty cycle are different and it has an
impact to the security of your communication as well.
16 17| |
Wireless Data Transport
RFID and NFC
RFID transponders are available in different frequency ranges: Low frequency (LF, 125 kHz), high frequency (HF, 13.56 MHz) and
ultra-high frequency (UHF, 868 MHz). UHF tags are often readable over distances of more than one meter and it is possible to detect
hundreds of them at once. That is why this technology is often used for car windshields or logistic applications. The reading range of
HF transponders is usually only a few centimeters.
That makes this technology perfect for security applications like
payment or to identify individuals. NFC uses specialized protocols,
but is based on HF RFID as well.
A RFID transponder is a memory that gets the energy for reading
and writing from the electromagnetic field. The memory contains
two main areas: one area contains a unique identification number
(UID). This 64 bit code is only available once in the world. It was
defined and programmed by the creation of the silicon and it can-
not be changed or erased. The UID code is often used for products
to identify if a device is an original device or not. You can also link
the set of a database to a specific UID code, like the personal num-
ber of an employee or the name of a team member.
The second area inside the memory can be programmed by the user.
It can be used to save non static information, like the data of the last
inspection, who conducted the inspection, and other useful informa-
tion. In some RFID transponders this memory area can be split into
sub-areas. Each of these sub-areas can be individually protected by
different codes to protect it against unwanted reading and/or writing.
A further variant of RFID transponders are the dual interface mem-
ories. Dual interface means the wireless interface (to connect the
antenna directly) and a second interface to connect a microcon-
troller. The interface to connect a microcontroller can be I²C or
SPI, depending on the product. Also the memory size, the mem-
ory technology (EEPROM or FeRAM) and the supported proto-
cols (ISO15693, ISO14443A/B, ISO18092, etc) could be chosen
differently.
Memory Sector Organisation of a M24LR04E-R (STMicroelectronics)
A dual interface RFID transponder allows programming the
memory without having powered the microcontroller. After pow-
ering the microcontroller, it can read inside the memory what has
happened while it was sleeping.
For example, the STMicroelectronics M24LR04E-R provides a
special protection mechanism based on passwords. In RF mode,
each memory sector of the M24LR04E-R can be individually pro-
tected by one out of three available passwords, and each sector can
also have read/write access conditions set.
Each memory sector of the M24LR04E-R is assigned with an sec-
tor security status byte including a sector lock bit, two password
control bits and two read/write protection bits.
Rutronik offers RFID/NFC solutions from STMicroelectronics,
Fujitsu, Panasonic, Murata, Toshiba and Melexis. As an example,
ST provides an exhaustive offer of NFC products and solutions
including ST21NFC state-of-the-art Controller and ST54 System
in Package, integrating the widely deployed ST33 Secure Element,
to address secure mobile transaction applications. It´s already
pre- certified for most of payment and transit schemes including
EMVCo, PBOC, Visa, MC, Amex, Discover, and MIFARE® allow-
ing customers to easily and quickly ensure security in mobile trans-
actions. Therefore a complete development ecosystem is available
including reference designs, expansion boards, pre-certification
services and integration into the most popular TSMs to help reduce
the time to market as well as development costs. Key Components Setup of a Full NFC System
18 19| |
Wireless Data Transport
Wireless SoCs and Wireless SoMs
It has become very popular during the last years to use System-on-
Chips or System-on-Modules with an integrated wireless transceiver.
The reason is, that the supplier of these components has full control
about the microcontroller, the peripherals, the memory, the wireless
transmitter and wireless receiver blocks and in case of a module also
regarding the antenna performance. As a result the supplier can offer
wireless protocols tailored for his own chip. The customer doesn´t
need to take care to adapt the software to hardware, because it was
already developed for this setup.
Rutronik can offer Wireless-SoCs from Nordic Semiconductor,
Renesas, Infineon, Toshiba and ST. Equivalent modules, includ-
ing antenna, crystals, pre-certifications etc., are available from Telit,
InsightSiP, Dynastream, Fujitsu, Redpine Signals and RF Digital.
There are solutions available with 8 bit, 16 bit and 32 bit MCU, dif-
ferent memory sizes, USB, ADC, NFC, Sub-GHz, 2.4 GHz and a lot
of other features you can choose of.
Taking an example: For the SoC named nRF52840 and its 3rd party
module variants, there are free wireless stacks available, like Thread
(IPv6 based home automation), Gazell (open source star network),
ANT (lowest power mesh network), Bluetooth Mesh, Bluetooth 5
(including high speed and long range modes) and customers have
the possibility to create their own wireless protocol as well. The
nRF52840 implements the ARM® CryptoCell-310 cryptographic co-
processor on-chip for building trustworthy applications with robust
industry grade levels of security.
Security is a paramount consideration for the design of connect-
able IoT devices today and in the future. Security must be a design
consideration from the ground up in any truly secure application.
ARM CryptoCell-310 is an integrated security core that consists of
both HW and SW components. It provides a comprehensive secu-
rity infrastructure that enables system wide protection that includes
use cases inside and outside the device.
It has a cryptographic hardware engine, providing CPU host
offloading, operation acceleration and power consumption reduc-
tion.
Algorithm Family Identification Code
Stream Cipher Cha Cha
MAC Poly 1305
Key agreement SRP
AES
FIPS197
NIST SP 800-38A
NIST SP 800-38B
NIST SP 800-38C
ISO/IEC 9797-1
Hash
FIPS180-3
RFC2104
RSA PKCS#1
Diffie-Hellman
ANS X9,42
PKCS#3
Middleware Architecture and Features / Source: Nordic SemiconductorSchematic Blockdiagram / Source: Nordic Semiconductor
There are cryptography and security middleware ser-
vices available. Platform Security building blocks
library and Device Life-Cycle- State manage-
ment is available, as well as a Key Manage-
ment infrastructure and a function called
Secure Boot to avoid load- ing dangerous
codes at startup.
So the CryptoCell-310 i n s i d e t h e
Nordic Semiconductor nRF52840 is a
multi-layered product, consisting of a
hardware security infrastructure,
and a middleware layer on top of it.
Algorithm Family Identification Code
ECC
ANS X9,63
IEEE 1363
ANS X9,62
Ed25519
Curve25519
FIPS-1864
NIST SP 800-56A rev.2
TRNG
NIST 800-90B3
AIS-31 (Class „P2 High“)
PRNG AIS-20 (Class „K4 high“)
General FIPS 140-2
nRF52840
20 21| |
Wireless Data Transport
Examples of Secure Wi-Fi Solutions
Some Wi-Fi examples of our portfolio with embedded security:
ST Microelectronics SPWF04
The SPWF04S from ST is a standalone 2.4 GHz 802.11 b/g/n Wi-Fi
transceiver module. It includes the common encryption
algorithms AES (128 bit & 256 bit) and hash (MD5,
SHA-1 & SHA-256), as well as the public
key algorithm RSA. Furthermore it
supports the security protocols WEP,
WPA2 Personal and WPA2 Enterprise.
Telit GS2011, GS2101, GS2200
The GainSpan Wi-Fi modules from Telit are based on the Gain-
Span SoC GS2000. It contains the security protocols WPA2 Per-
sonal and WPA2 Enterprise and uses TKIP and AES encryption.
Upper layer encryption includes TLS, SSL, HTTPs, PKI and digital
certificates.
Wi-Fi
Data transmission with Wi-Fi is carried out with radio waves at high frequencies and is commonly used in many different applications
where a high data rate is needed, or the internet access by using an existing Wi-Fi infrastructure or to offer an own webserver service.
Most established is Wi-Fi within the 2.4Ghz band, but also 5 GHz is already accepted at least in the consumer world. New specifications
also offer Wi-Fi within 60 GHz and Sub-GHz bands as well. The amount of personal data sent over the air makes it attractive for cyber
criminals to buck up this information or manipulate it. Luckily there are security protocols which make it more difficult for unautho-
rized persons to get access to this data.
The currently used security protocol within Wi-Fi is WPA2 which is presumed to be very robust and safe, but still attackable by the
Brute-Force-Method. WPA2 makes the connection between Wi-Fi access point and Wi-Fi device secure, so that nobody is able to fish a
readable data stream out of the air. WPA2 is not a solution for E2E (end-to-end) security, so you need to have SSL/TLS or other security
layers on top of it to protect your net data also on its way through the internet after the access point.
There are two versions of WPA2: WPA2 Enterprise Security and WPA2 Personal. Both use a strong encryption method called AES-CCMP
to encrypt data transmitted over the air. The main difference between these security modes is in the authentication stage: While WPA2
Personal uses pre-shared keys (PSK), WPA2 Enterprise uses IEEE 802.1X. The WPA2 protocol is only securing from device to the access
point, not form device to end device. To avoid this problem there is the option of using a VPN-tunnel, which provides a secure point-to-
point connection across the internet on the lower communication layer (independent of the applications on higher layers in use).
Redpine Signals Wi-Fi Modules and
Combined Technology Modules
Connect-io-nTM Family modules are ready to use Wi-Fi modules,
optionally having Bluetooth and ZigBee integrated as well. WEP,
WPA and WPA2 are onboard, as well as HTTPS, SSL 3.0, TLS 1.2 and
the possibility to make wireless firmware updates. WiSeConnectTM
Family are supporting Enterprise Security (EAP-TLS, EAP-FAST,
EAP-TTLS, EAP-PEAP) on top of the features of Connect-io-nTM.
The n-LinkTM family offers WPA2 and Enterprise Security fea-
tured on the external host system. Software stacks are available
for Linux, Android, WinCE7, WEC2013, Windows 7, Windows
10 and Windows 10 IoT.
Further stand-alone solutions with WPA2 Personal are offered by
Panasonic and Silex. Advantech, Silex and Intel are offering solu-
tions with standard interfaces to run also Enterprise Security on
the host system.
SSID and WPS
Most people would recommend hiding the SSID (Service Set Iden-
tifier - the name of the WLAN network) to prevent connection
attempts from others. But this method is useless: when connecting
to your own WLAN network / SSID, your device sends out signals
containing the SSID name not crypted, so everybody in the net-
work range can sniff it anyway. A disadvantage would be the higher
power consumption for all Wi-Fi nodes scanning for available
Wi-Fi networks. We recommend to do it in the opposite way:
use the administrators e-mail address as name for your network.
WPA2 Enterprise Security
WPA2 Enterprise uses IEEE 802.1X authentication and is cur-
rently the most robust authentication for WLAN. It is specifically
designed for the use in large organizations with many Access
Points, for example hospitals or universities. It requires a RADIUS
authentication server and needs a username and password. It also
supports multiple accounts for each user. For both encryption
and decryption the same key is used within the AES block cipher,
which has a length of 128 bit. There are four stages included for
one round in AES encryption, that’s why it’s often also called four-
way handshake.
WPA2 Personal / WPA2 PSK
WPA2 Personal uses pre-shared keys (PSK) and is designed for
small networks like for example home use. A PSK is a secret alpha-
numerical string associated to the Access Point (AP). The commu-
nication between the Station and the Access Point is encrypted by
AES cipher with a 256 bit symmetric key. It only uses one single
password/key which is generated at every session and is the most
used Wi-Fi security standard. Like in WPA2 Enterprise Security,
the protocol used to derive the key is called four-way handshake.
The alternative cryptographic method WEP is not secure and
should not be used any more. The predecessor WPA is consid-
ered as secure, but shouldn´t be used because WPA2 is qualified
as even more secure.
Then everybody could contact you if there is a topic on frequency
management (channel adaption) or if somebody wants to ask to
get the network key or adding his device to the whitelist of MAC
addresses.
The feature Wi-Fi Protected Setup (WPS) was made to connect
devices more easily to an access point. The WPS will exchange the
WPA2 key by only using a four digit pin code, for example. This
makes it much more easy to hack a WPS enabled router.
The connection will be jammed until it breaks. At the try of a
reconnect there will be a fake access point offering the same SSID
and WPS service. The records of the WPS procedure will be used
to attack the original access point, similar to a man-in-the-middle
attack. The leak was possible because the pin code was linked to the
MAC address of the routers. At new routers this bug was solved.
Anyway, using WPS is always more comfortable by losing some
levels of security.
In general, we recommend to use the MAC filter of your access
point to allow only listed devices to join your network. Use long
WPA2 keys and they shouldn´t contain words of a dictionary.
Check available firmware updates frequently. Disable WPS and
don´t hide your SSID. Use the channels 1.6 and 11 only. These
are non-overlapping. All other channels would not allow to estab-
lish three Wi-Fi networks in parallel without having double used
frequency blocks. This would make at least two networks slower,
because more resent packages will be necessary.
22 23| |
Wireless Data Transport
2.4 GHz ISM band) are competing in the same frequency band and
therefore interfering each other. AFH detects these interferences
and then excludes these blocked channels. At least 21 channels
(21 MHz) will be used and still could influence a Wi-Fi network.
The Forward Error Correction (FEC) is a method which enables
a receiver to detect and also correct errors in transmitted data.
Bluetooth is still considered as secure because of the AES-128
coding.
Bluetooth EDR vs. Bluetooth LE vs. Bluetooth 5
Bluetooth (IEEE 802.15.1) is the most used wireless standard in the 2.4 GHz ISM band. It is good for the exchange of data over short
distances. Within this technology you can mainly differentiate between Bluetooth Classic (EDR) and Bluetooth Low Energy (BLE). Blue-
tooth 5, which was published lately, is an enhancement of Bluetooth Low Energy mainly adding modes for longer range or higher speed.
Bluetooth Low Energy (BLE)
Bluetooth Low Energy is transmitting single data telegrams and has
quick connecting times. It's extremely energy saving and therefore
perfectly for applications which for example only need to send a sig-
nal every few minutes. Like Bluetooth Classic, it is using Adaptive
Frequency Hopping (AFH) and Forward Error Correction (FEC).
Each channel has a bandwidth of 2 MHz, by having 37 channels
for data exchange and 3 channels for advertising. The advertising
channels are placed before Wi-Fi channel 1 starts, between channel
1 and 6, and the thirst BLE advertising channel is placed after Wi-Fi
channel 11. A further difference between BLE and classic Bluetooth
is that BLE is not changing the channels permanently. Only if distur-
bances are detected, the channel will be changed.
Bluetooth Low Energy
Supports the Following Security Concepts:
■ Pairing: Devices create one or more shared secret keys
■ Bonding: The act of storing the keys created during pairing for
use in subsequent connections; this forms a trusted device pair
■ Device authentication: Verification that the paired devices
have trusted keys
■ Encryption: Scrambling of plaintext message data into
cipher text data
■ Message integrity: Protects against tampering with data
Since Bluetooth Low Energy Version 4.2 there is also an increased
security support implemented: the numeric comparison method
and the Elliptic Curve Diffie-Hellman (EDHC) algorithm. Also the
fact that private keys are not shared over the air makes this version
and successors secure against passive eavesdropping, as it’s difficult
to encrypt the transmitted data without.
Bluetooth Classic (EDR – Enhanced Data Rate)
Bluetooth EDR is using between 21 and 79 channels depending
on how much Wi-Fi networks (interferences) are detected. Each
channel has a bandwidth of 1 MHz and the channels are changed
1600 times per second – always and permanently. It has Adaptive
Frequency Hopping (AFH), Forward Error Correction (FEC) and
a 128 bit AES-encryption.
Adaptive Frequency Hopping (AFH) is a technology that comes
into action, when Bluetooth and Wi-Fi (both using the unlicensed
Bluetooth 5
Bluetooth 5 is an upgrading of Bluetooth Low Energy: It could
have four times the range, two times speed and eight times data
transmission, but still using low energy. That makes Bluetooth 5
an attractive alternative for many Wi-Fi IoT applications, but also
easier for hackers to get the transmitted data from a bigger distance
in a shorter time. Till now, Bluetooth 5 only offers device authen-
tication, but no user authentication.
The most popular products to use Bluetooth technology are SoC
or SoM components because of the complexity of the wireless stack
and the fast ongoing evolution and available improvements tailored
to dedicated host system. Please have a look to chapter “Wireless
SoCs and SoMs” in this book.
24 25| |
Wireless Data Transport
Nordic Semiconductor provides a Software Development Kit
(SDK) for any Bluetooth Mesh development – the nRF5 SDK.
It is compatible to the nRF51 and nRF52 System on Chips and
is perfect for the use in consumer, smart home and industrial
applications.
Additionally to the Bluetooth mesh security features of the Blue-
tooth SIG, Bluetooth mesh devices of Nordic support a secure side-
by-side and blocking device firmware updates. Next to that, a serial
interface allows control of the mesh network.
Bluetooth Mesh Networking
In order to keep up with rival standards like Thread or ZigBee, Bluetooth SIG decided to launch a communication standard that allows
a many-to-many (m:m) connection as well as connections between devices of different suppliers. Until July 2017, there was only a star
network and point-to-point Bluetooth Low Energy connection possible.
Bluetooth mesh networking supports connections up to 32,000
nodes. With that, this network is much bigger than all other mesh
networks and allows bigger distances. As many benefits and
improvements m:m connection has, as many security risk this
brings.
One main focus while developing Bluetooth mesh networking was
therefore the question how to keep this technique secure. Impor-
tant to know is, that all possible security features are subject to
the decision of the product designer, he can decide which of them
will be integrated.
The Most Important Security Features are:
■ Authentication and encryption of all Bluetooth mesh messages
■ Network, application and device security are addressed
independently
■ Subnets of the mesh network are distinct and secure form the
others
■ Key refresh procedures allow the change of the security key
during lifetime of the network
■ Message obfuscation hinders message and node tracking
within the network
■ Bluetooth mesh security protects the network against replay
attacks
■ Secure removal of nodes from the network, so that trashcan
attacks are prevented
■ Secure adding of devices to the network to become nodes
AHB Multi-Layer
ARM® Cortex® CPU Secure Boot Embedded SRAM
APB
DMAC
Data Routing
HASHAES ChaCha
TRNG
PKA
SRAM
SRAM
Control E
ng
in
e
C
on
tr
ol
L
og
ic
ARM® TrustZone® CryptoCell 310
S
la
ve
M
as
te
r
AHB-APB Bridge
M
as
te
r
S
la
ve
Embedded Flash
CryptoCell API
S
la
ve
S
la
ve
AO
domain
S
la
ve
M
as
te
r
Designed to address the inherent security challenges that are faced in IoT, the nRF52840 advanced multi-protocol
SoC (supporting Bluetooth 5, ANT, 802 .15 .4, and 2 .4GH proprietary) incorporates the ARM® CryptoCell-310 crypto-
graphic accelerator offering best-in-class security for Cortex-M based SoCs .
ARM CryptoCell-310 is an integrated security core that consists of SW and HW accelerator for symmetric and asymmetric crypto-
graphy including NIST recommended standards for key exchange, hash generation and data encryption. It includes a FIPS compliant
True Random Number Generator (TRNG) and implementations for Cha Cha, ECC (with multiple curves), AES, RSA, SHA and others.
DESIGN TRUSTWORTHY IoT APPLICATIONS
WITH ROBUST LEVELS OF SECURITY
The nRF52840 SoC also supports read/write/erase
protection for memory that can be reserved for crypto-
graphic keys. On-chip memory protection module is to
protect stored bootloader code memory from flash write/
erase.
Secure boot - Using a combination of HW supported cryp-
tographic functions and memory protection, secure boot
to establish a root of trust is able to be implemented.
Secure OTA DFU – Using a combination of on-chip security
accelerators, memory protection features and boot loader
SW implementations, Over-The-Air
Device Firmware Update (OTA
DFU) is supported for secure,
authenticated deployment of
firmware images.
www .nordicsemi .com
ARM CryptoCell-310 high level block diagram
Advertisement: Nordic Semiconductors26 27| |
Wireless Data Transport
Thread vs. ZigBee vs. other 2.4 GHz Mesh Solutions
Further technologies are available to build up wireless mesh networks. Some protocols are based on top of the IEEE802.15.4 specifica-
tion (PHY and MAC layer specification). The advantage is the possibility to change the transceiver from one supplier to another, so you
are more independent than using a single source. The disadvantage is the specification itself. The DSSS modulation, having 5 MHz per
channel and only 16 channels available is very often not the perfect choice for an application because it needs more energy and frequency
resources than other modulation schemes. Also IEEE802.15.4 solutions are often based on SoCs instead of separated transceiver and
microcontroller. In case of using a SoC the advantage of being independent from a single source is not given.
Thread
Thread is based on IEEE 802.15.4. At the network and transport
layers Thread uses a combination of IPv6, 6LowPAN (IPv6 over
Low power Wireless Personal Area Networks), UDP (user Data-
gram Protocol) and DTLS (Datagram Transport Layer Security).
The application layer can be defined individually. As it is using
IPv6, Thread can be used to integrate home automation devices
directly to the IoT, without the need of making any protocol and
address conversion. IPv6 has a strong encryption and authentica-
tion mechanism integrated – the IPsec. Part of this security pro-
tocol is:
■ Interoperability
■ Cryptographic protection of the transmitted data
■ Access control
■ Integrity of data
■ Authentication of transmitter (user authentication)
■ Encryption
■ Authentication of keys
■ Administration of keys
(key management)
For the Nordic Semiconductor nRF52840 there is a free Thread
stack available, which could be used in parallel to Bluetooth 5, ANT
and others at the same time. The Thread Group has some strong
market drivers in its board, so we would not wonder if it will be the
de facto standard for home applications soon.
ZigBee
Also ZigBee is based on IEEE 802.15.4. The network, transport
and application layers are defined by the ZigBee Alliance. ZigBee
is already widely adopted and includes a mature application layer
called the ZigBee Cluster Library. ZigBee uses the counter mode
(CTR) encryption, which has a 128 bit AES length and the cipher
block chaining (CBC) with a 128 bit AES for the generation of
the message integrity code (MIC). Within ZigBee a Trust Center
(TC) device is determining and approving who wants to join the
network. The Trust Center either instructs the router to authenti-
cate the joined device or force it to leave. There are three types of
ZigBee security keys to protect the data: link, network and master/
application keys. All of them are symmetric.
ANT, ANT BLAZE and ANT+
ANT is a wireless sensor network protocol with ultra-low-power
consumption and communication over short distances. As it is very
compact, it requires few memory capacities and therefore reduces
system costs. The ANT protocol was developed to connect coin
cell battery powered sensors (small data packets). ANT supports
different network topologies like peer-to-peer, star, tree and mesh.
ANT has a network key integrated, which ensures that only devices
with the same valid network key can communicate with each other.
ANT will be placed on top of the PHY and MAC layer of the ICs
from Nordic Semicondtcor, using GSFK modulation (1 MHz per
channel, channel will be changed only if disturbances are detected).
On top of ANT you can choose if you want to make your own
application layer or you can choose one of the defined ANT+
stacks. ANT+ application stacks are available for a lot of standard
sensors and services. Using ANT+ makes you part of the ecosys-
tem and being compatible to other companies giving security and
allows to make your communication very efficiency in regards to
energy consumption.
Important to know: ANT is supported by most of the Android
based smartphones. There is also a small USB stick available to
integrate computers to the network. Further there is a combined
stack of ANT and Bluetooth LE available, which enables further
connectivity possibilities.
Most of the SoCs by Nordic Semiconductor supports ANT. Regard-
ing SoMs we recommend to use a module from Dynastream. This
supplier is the only one who has full control about the protocol and
standardized profiles. The D52 ANT SOC Module Series supports
dual protocol ANT and Bluetooth Low Energy.
There are two categories: The general purpose category pro-
vides the most cost effective module solution for ANT and
ANT+ applications. And the premium category adds the capa-
bility to run licensed IoT technologies such as ANT BLAZE.
This series offer advanced burst data transfer mode with up to
60 kbps and optional the 128 bit AES encryption mode.
Gazell and ShockBurst
Gazell is a free low-power open source protocol for the
2.4 GHz ISM band developed by Nordic Semiconductor, which
is implemented on top of the Enhanced ShockBurst (ESB)
protocol. It is robust against interferences as it has channel
hopping functionality. It supports the star network topology
between a single host and up to eight devices. Data trans-
fer within Gazell or ShockBurst is carried out bidirectional.
To prevent data loss, Gazell and ShockBurst includes packet
buffering, packet acknowledgement and automatic packet
retransmission of lost packets.
Be Aware:
In 2016 scientists from the Weizmann Institute of Science in
Israel and from the Canadian Dalhousie University found a
security hole within the wireless ZigBee standard, extracted
a security key and put manipulated firmware (“worm”) on
to the Philips hue bulb. Through that, they were able to
control the lightbulbs. This is a serious problem regard-
ing security, as this “worm” can “infect” all other wireless
devices in the same network.
The Telit ZE61 (100 mW, long range) modules enable the
certified Telit ZigBee PRO protocol stack. They are suited
for home automation and control applications as well as
building automation.
28 29| |
Wireless Data Transport
Security at Cellular Wireless Technologies
Within a mobile cell, there are many members who transfer their data for and back to a base station and therefore for and back to the
internet, different safety aspects have to be considered. First of all a secure protocol needs to be in place for encryption and authentica-
tion aspects, so the transferred data can’t be read out by anyone else and the sender and receiver can be trusted. Secondly the SIM Card
needs to have an up-to-date encryption standard so the end nodes can’t be attacked by an unauthorized third party.
Telit’s one stop one shop philosophy brings a great choice, from different Cellular Hardware solutions, like the xE910 and xE866 family
which can be combined with the right SIM Card solution and IoT Portal from Telit, especially created for industrial applications.
xE910 Family from Telit
The xE910 family from Telit addresses global applications requir-
ing one-region-at-a-time coverage and is ideal for fixed-wireless
applications such as utility metering, home and commercial secu-
rity and situations with limited in-region mobility such as POS and
logistics terminals.
The xE910 family allows applications to be upgraded easily,
through a variety of options, such as migrating from 2G to 3G or
4G or upgrading from 2 bands to 3, 4 or more. The family fully
preserves the core design of the application or device from launch
to phase-out with modules packaged in a common 28.2x28.2 mm
LGA footprint. SSL 3.0 and TLS 1.0 - 1.2 protocols are integrated
in the xE910 family software package and can be easily set via AT
commands.
What Could Happen if You Choose the Wrong Module?
The biggest German motorists' club, ADAC, was able to hack the
BMW ConnectedCar system in the beginning of 2015. They were
able to remotely unlock 2.2 million vehicles of BMW, Mini and
Rolls-Royce by using the internal GSM module. The communica-
tion was using the same symmetric key for all cars, based on DES
with a 56 bit key. To sign the messages, three methods were imple-
mented: DES CBC-MAC, HMAC-SHA1 and HMAC-SHA256. The
algorithm used is indicated in the header of the message. To sign
and encrypt data, 16 pairs of two 64 bit keys each are used. Which
key pair is being used is also noted in the header of the message.
It was not clear why BMW was using DES encryption as this algo-
rithm has been considered broken for some time. Its block length
is shorter compared to several other crypto algorithms, leading to
shorter messages. The surprising thing about what had happened
was that the cellular connection between the vehicle and the BMW
servers could be logged without problems in an emulated network.
The car had sent a simple HTTP Get request; there was no encryp-
tion with SSL or TLS in transit. We want to mention that the used
module inside the car box was not a module from Telit. At that
time Telit has already offered SSL/TLS as a standard. The disclo-
sure of the vulnerabilities was coordinated by ADAC with BMW to
give the company enough time to secure their services. A configu-
ration change to enable encryption in transit for ConnectedDrive
data has now been triggered via cellular connection. According to
BMW, the certificate of the server is now being checked as a con-
sequence of this. However, car owners cannot be sure if their car
has received this change. To find out, owners can contact a BMW
hotline at 0 89 / 1 25 01 60 10. Owners can also trigger the change
manually by selecting Update Services in the car's main menu.
M2M SIM Cards with Higher Level Security
Each SIM Card has basically the same function: to identify and
register the owner in a cellular network. The SIM Card buffers the
secure keys in order to acknowledge the owners identity and to
encrypt and decrypt all the data/communication. Unfortunately
not all SIM Cards use a secure encryption system and the soft-
ware is not implemented well enough, so they can be easily hacked.
We recommend: Keep your fingers away from SIM Cards which
have only DES (Data Encryption Standard) as encryption standard.
It is not considered safe enough.
We recommend, check for SIM Cards, like the one from Telit with
high security levels.
Telit’s SIM cards offer 2G, 3G & 4G LTE custom plans for data,
SMS & voice on tier-one networks. The terms of use are simple –
one agreement with predictable pricing and no hidden fees or
roaming charges. Furthermore Telit offers a 24/7 support with
dedicated IoT experts and an account team. The SIM cards offer a
multi-layer security & VPN connections. A 4-8 digit PIN protection
preserves the system from use of unwanted third. The VPN solu-
tion uses IPSEC, an encryption protocol in order to transfer data
packets with the highest security level by using tunnels. Further-
more the SIM cards are manufactured in heavily audited produc-
tion sites. The IoT NOC (Network Operation Center) from Telit
works 24/7/365 and monitors all the operations. It works reactive
as well as proactive and alerts to customers on misbehavior devices.
Telit works with different MNOs (Mobile Network Operators) all
around the globe, like Vodafone, Telefonica, at&t, Verizon, Sprint,
Tele2 and Rogers. This enables roaming across different regions
& networks around the world so the connection will not be lost.
Change easily between technologies thankss to same form, same size and same AT commands
Internet
Telit IoT
Platform
DB
Private VPN
& TLS
TLS
S2S VPNS2S VPN
Private VPN
& TLS
API API
Public
Domain
Wireless
Domain
Platform
Domain
Customer
Domain
TLS
TLS
TLS
TLS
Private
APN
Enterprise
Gateway
TLS
TLS
TLS
Private
Data
Data
dataPATHS
In
te
rn
et
Te
li
t
Io
T
P
la
tf
or
m
D
B P
ri
va
te
V
P
N
&
T
L
S
TL
S
S
2S
V
P
N
S
2S
V
P
N
P
ri
va
te
V
P
N
&
T
L
S
A
P
I
A
P
I
P
ub
li
c
D
om
ai
n
W
ir
el
es
s
D
om
ai
n
P
la
tf
or
m
D
om
ai
n
C
us
to
m
er
D
om
ai
n
TL
S
TL
S
TL
S
TL
S
P
ri
va
te
A
P
N
E
nt
er
pr
is
e
G
at
ew
ay
TL
S
TL
S
TL
S
P
ri
va
te
D
at
a
D
at
a
da
ta
P
A
TH
S
Operational
Platform
TR50
TLS
TLS
APN
Cellular Network
Module
TLS
Media
Security
Application
Transport
Network
Operational
Platform
TR50
TLS
TLS
APN
Cellular Network
Module
TLS
Media
Security
Application
Transport
Network
Oper tional
Platform
TR50
TLS
TLS
APN
Cellular Network
Module
TLS
Media
Security
Application
Transport
Network
30 31| |
Data Storage
Silent data corruption can be costly and occur more
frequently than expected
Silent data corruption events may occur more frequently than
perceived and can seriously impact a business on multiple levels.
Approximately 11 drives per 1000 can experience silent data cor-
ruption in a year and up to 10% of catastrophic storage system
failures have been linked to silent data corruption. This unwanted
scenario can lead to multiple negative consequences, such as opera-
tions being carried out incorrectly or data being lost completely. A
business affected by a silent data error scenario can experience sig-
nificant downtime and in the worst case loss of business. It is esti-
mated that retrieving the data and servicing the data center due to
downtime has an average cost of $8,850 per minute. A prime exam-
ple of costs and business risk associated with silent data corruption
is Amazon’s 36 hour S3 cloud server downtime in 2008, which left
many businesses with partially or fully broken websites, apps and
devices. This and many other examples highlight the vast poten-
tial damage that silent data corruption can have on your business.
The Causes of Silent Data Corruption
Cosmic Rays
For SSDs cosmic rays are the main source of worry for silent errors.
Protons and heavy ions originate from the sun and stars and inter-
act with the atmosphere to create neutrons. The neutrons multiply
quickly in a cascading reaction and once reaching the earth, they
pass through a person with approximately 10 neutrons/second.
In rare circumstances, these high-energy particles can strike
integrated circuits, such as a SSD, causing bits to flip in the silicon
of the flash cell.
Neutron and Alpha Particles
Generally, neutrons do not carry electrical charges. However, if a
neutron gets close enough to a Silicon nucleus, there is a chance
that the Silicon nucleus turns into an excited state. An excited Sili-
con nucleus tends to disintegrate while generating a shower of par-
ticles. The shower can be made of more alpha particles or heavier
particles which is a carbon nucleus. If these extra free electrons
and particles, which were generated from alpha particles interac-
tion with electrons in the silicon substrate, are created close enough
to a source or a drain junction, these electrons can essentially get
sucked into the output of the transistor, creating a current pulse.
These pulses are lower than neutron particles, but last longer – 60
to 100 picoseconds. Alpha particles occur less frequently than neu-
tron particles, but, because they generate electric hole-pairs every
time, they cause errors at about the same rate as cosmic rays. Sus-
ceptibility to these particles varies on the SSD component.
As the larger nucleus travel through the substrate, they create a
large amount of charge. The charge creates a current pulse in the
transistor, which results in a bit flip.
SSD Susceptibilities to Particle Incursions
Essentially, scaling down of geometries increases the susceptibility
to particle current pulse. In a Solid State Drive (SSD) the control-
ler and DRAM are the most vulnerable components to a bit flip.
Bit flips in these components can apparently make firmware code
execute incorrectly, causing silent errors and other problems.
On the other hand, flash memory in SSDs is fairly insensitive to
these kinds of errors. The NAND is loaded with ECC protec-
tion, and enterprise drives (among others!) have end-to-end data
protection.
Ideally, the data written by the host goes through the CPU logic
and SRAM, which are located in the controller, and the controller
picks an available and suitable position on the NAND to write the
data. This way the data goes through the transfer buffer and makes
it into the NAND completely intact. If the user wants to read the
data then the order is simply reversed. However, in case of incorrect
behaviour in an SSD we know three bit flip scenarios:
1. The bit flip can occur in transit if upstream of NAND ECC
2. The bit flip can happen in the controllers cache, which results in
the controller performing the wrong instruction
3. The bit flip might occur in the CPU logic, which can cause wrong
sector reads, missed instructions and / or controller hang.
Silent errors can result in unreported data corruption, which has
the capability of destroying data or rendering the data completely
useless. These errors pose a serious threat now and in the future
when considering the projected amount of data that will be gen-
erated from IoT, Industry 4.0 and many more industries. A study
conducted some years ago by CERN revealed that undiscovered
errors can occur every 1016 bits on average. More recent studies
have produced similar average values.
Larger capacities are not a solution to the problem, as modern hard
disks simply multiply the 1/1016 error count several times over.
Silent Data Corruption – The Neglected Hazard
Generally we can distinguish between two types of errors: the ones that are detected and those that are not. Although all types of errors
are unwanted, at least detected errors are a known variable. Unlike detected errors, undetected errors give no notification, no warning
and leave no logging information, which makes it extremely difficult to implement error-correction routines.
Data corruption
Detected Undetected
Uncorrected
Corrected
Silent Data
Corruption
Host
CPU logic
SRAM Cache
CPU logic and NAND ECC
NAND
Controller
SSD
DR
AM
Correct behavior Incorrect behaviors
• Written data
´X´goes
through logic
and SRAM
• Controller
picks NAND
location and
writes
• Read is sim-
ply reverse
order
Multiple modes
Bit flip in transit if upstream of
NAND ECC
Bit flip in instruction cache.
Controller executes wrong
instructions
Flip in CPU logic. Can cause
• Wrong sector read
• Missed instruction
• Controller hang
CPU logic
SRAM Cache
CPU logic and NAND ECC
NAND
Controller
SSD
DR
AMx
x
x
Y
-
Instruction = ?
Hostx x x
X Y + -
1
2
3
1
2
3
Host
CPU logic
SRAM Cache
CPU logic and NAND ECC
NAND
Controller
SSD
DR
AM
Correct behavior Incorrect behaviors
• Written data
´X´goes
through logic
and SRAM
• Controller
picks NAND
location and
writes
• Read is sim-
ply reverse
order
Multiple modes
Bit fl p in transit if upstream of
NAND ECC
Bit flip in instruction cache.
Controller executes wrong
instructions
Flip in CPU logic. Can cause
• Wrong sector read
• Missed instruction
• Controller hang
CPU logic
SRAM Cache
CPU logic and NAND ECC
NAND
Controller
SSD
DR
AMx
x
x
Y
-
Instruction = ?
Hostx x x
X Y + -
1
2
3
1
2
3
32 33| |
Data Storage
RAID – Redundant Array of Independent Disks
RAID systems are one option to prevent data loss. A RAID system consists of multiple physical mass storage devices, ordinarily hard
disks or solid state disks, which are then organized into a single logical drive. A RAID system requires at least two storage media to be
operated as a unified storage medium in order to increase reliability. There are different RAID levels, with RAID 1 having a specified
reliability rate of 0.0001%. In a RAID 1 system, two disks are written with identical data, containing all of a system’s data. If one of the
two disks fails, the second disk can continue to supply all of the data. A RAID system is especially indispensable in real-time systems
where security and safety are critical.
Consumer SSDs Professional SSDs Data Center SSDs Embedded SSDs
545s
540s
535s
530s
600p
Pro 5450s
Pro 6000p
Pro 5400s
Pro 2500
Pro 1500
S4600
S4500
P4501
P4600
P4500
S3520
P3100
P3520
S3100
D3700
D3600
S3610
P3608
S3510
S3710
S3610
S3500
S3700
S3320
E 5100s
E 7000s
E 6000p
E 5400s
Host
CPU logic
SRAM Cache
CPU logic and NAND ECC
NAND
Controller
DRAM
ECC or
parity on
RAMs
End-to-End
CRC data
protection
1
2
2
2
Basics
1
Intel’s SSD Products with AES 256-Bit Hardware Encryption
ECC – Error Correction Code
Another way to prevent memory corruption is to employ error correction methods such as ECC (error correction code). RAM and mem-
ory modules in particular feature models that offer additional ECC RAM. Especially in applications where the memory needs to process
a large number of write and read operations, errors can arise when writing, causing the wrong data to be stored and possibly crashes to
occur. Such RAM should be an essential feature of any server or storage system. With ECC, an additional redundant byte is generated for
each 8-byte word before writing. This byte is used to detect errors when data is written and transferred, and to correct them where possible.
Quality and control procedures that help
to detect and prevent bit flips:
■ ECC or parity on RAMs
■ End-to-End CRC data protection
■ Interleave to reduce vulnerability to multi-bit errors
■ Protect all critical storage arrays within controller
■ The firmware will activate a brick drive if it is not certain
whether a silent data corruption occurred
Validating Silent Data Corruption Requirements
Apart from rigorous hardware selection and software implemen-
tation processes Intel also goes above and beyond in their test-
ing capabilities. Intel owns a neutron particle testing facility – the
Los Almost Neutron Science Center. Intel’s science center allows
them to perform neutron and alpha particle tests beyond the stan-
dardized guideline by the industry. While traditional tests have a
RDT limit of 10-18 Intel uses measurements as low and accurate as
smaller than or equal to 10-22. This way Intel exposes their SSDs
to high intensity particle beams detecting to 0.000001 % per year.
At measured conditions, less than 1 drive per 1,000,000 per year
will experience silent data corruption.
Intel’s Security Solutions – Designing for Data Integrity
Server customers have extremely rigorous specifications for silent errors. Usually they allow as few as silent error per 1025 bits, or one per
billion drives. Simply put, server customers have close to zero tolerance for silent errors. Consequently, Intel wants to eliminate bit flips
completely and reduce them to a bare minimum in order to fulfil the customer’s rigorous requirements. This is achieved by implementing
quality control and testing procedures that go beyond the basics. To combat faulty execution, Intel designed firmware that validates its own
behaviour. If the self-testing mechanism detects suspicious activities, then the drive performs any actions necessary to preserve the integrity
of the data. These actions could entail reporting an uncorrectable error to the host or cancelling a non-critical operation. If a critical operation
cannot be verified and data corruption is possible, the drive locks down, which prevents the possibility to compromise the data’s integrity.
The Intel Advantage – Security and Integrity for Your Data
Besides offering integrity and reliability against unknown and
known errors, Intel also includes features in their SSD products that
keep your data safe and secure –the hardware encrypted 256 bits
Advanced Encryption Standard (AES). AES is a cypher with differ-
ent key and block sizes that helps to keep data safe from unwanted
access. The block size is set to 128 bits while the key has up to
three lengths: 128, 192 and 256 bits. Out of the three key lengths
256 bits offers the highest level of security, due to the large num-
ber of bits being used in the key. Hardware encryption offers an
additional layer of security, because all the data is encrypted prior
to being stored in the SSDs flash memory. Once the data has been
encrypted and written into the flash memory, the data becomes
almost impossible to decrypt without the original encryption key.
The AES 256 bit encryption feature is considered to be so secure
that it has even been approved by the National Security Agency
(NSA) for securing top secret information.
Intel – A Trusted Partner for Unparalleled Reliability & Integrity
Intel’s design and testing allows them to deliver a wide selection of
SSDs with unparalleled reliability, which minimizes silent data corrup-
tion to occur in your data center, enterprise and industry application.
34 35| |
Data Storage
Hardware-based Data Protection
Hardware-based data protection differs from software-based data
protection in that it provides a much higher degree of security. Com-
puter centers are very willing to implement software-based security
measures, amongst other things for reasons of scalability and cost
reduction. However, in such cases the assumption is made that an
attacker cannot access the hardware under any circumstances. In
embedded scenarios, the hardware is generally very close to the cus-
tomer and very prone to attack. Hardware-based security measures
are of crucial significance here.
Authentication
The implementation and administration of roles and access rights
are determined by strong authentication. Whereas hardware can be
configured so that access is determined through authentication by
means of a retry counter, no software is capable of withstanding so-
called ‘brute-force’ attacks. There are many common examples of a
dual strategy, also referred to as two-factor authentication, includ-
ing the procedure to switch on a mobile telephone or obtain cash
from an automatic teller machine. In the latter case, a transaction
is only authorized when a user can supply a data carrier that can-
not be copied and the matching PIN. Whenever confidence and
securing valuables is concerned, data protection involves hardware.
Data Storage – What Needs to be Borne in Mind when Selecting Storage Media?
Storage of personal data should be subject to adequate security measures. Companies are required to adopt suitable technical and admin-
istrative measures to protect such data, and also to document such measures.
Encryption
In addition to authentication, data encryption within a data carrier
is also advantageous. Where software encryption is involved, the
key is necessarily present on the processing machine. This repre-
sents a risk, because these days any environment can be virtualized
using open source software, and this means that it is, in principle,
possible to examine encryption software while it is executing. In
other words, as soon as an application can be separated from the
target platform, purely software-based data protection concepts
prove to have weaknesses. Such risks do not exist where hardware-
based encryption is used – or only to a very limited extent.
Much sensitive data is stored externally – in other words, physically
removed from a company’s own IT infrastructure. If such informa-
tion also involves personal data, the same requirements in respect
of protection apply. In all these circumstances, an adequate degree
of security must be provided for. This means, it makes no difference
whether the data is to be found on laptops, smartphones, in third-
party offices or on a central server. A case in point is to be seen in
the encryption of data on mobile devices. If such a device is stolen
or gets lost, the data should not be accessible to anyone else, and
preferably remotely deletable. Any encryption implemented to this
end should only be decryptable by the company itself.
Comprehensive security measures such as encryption are very ben-
eficial. If it is possible to prove that all lost, stolen or in any other
way endangered personal data has been made inaccessible to all
unauthorized persons, it is not necessary to inform the authorities
of the data protection issue, nor the affected persons. This means
that the security requirements can be fulfilled more easily and the
risk of financial loss and an image problem can be minimized.
The measures include protection against unauthorized access to
the data, as well as ensuring availability and a sufficient degree of
robustness for the systems involved. In other words, the data should
be protected against inadvertent impairment or loss of the body of
information. In this connection, attention needs to be paid not only
to storing the information, but also to removing it, i.e. to its perma-
nent deletion. Scenarios in which this aspect may gain in relevance
include requirement to do so by an authorized party, replacement
of storage media and theft. Following evaluation of the security
level needed to address the risks involved, a suitable technical solu-
tion must be found that meets current engineering standards.
37|36
Data Storage
Apacer's Security Solutions
Apacer’s CoreSecurity is a proprietary data protection technology developed to elevate the data security level through customized firmware
and prevent data leakage for higher reliability of storage devices.
CoreSecurity is a proprietary data protection technology built into Apacer SSD products. It is crucial for mission-critical applications,
where data erase, drive sanitization, and reliability of data storage are essentially required. CoreSecurity provides the following three types
of technologies designed with exclusive software commands to meet clients’ requirements of a high level of data protection.
CoreDestroyer Technology
The CoreDestroyer Technology terminates all the data in the drive,
even the firmware and the management table. The drive would
be unable to perform its functions. To bring the SSD back to life,
firmware reloading is necessary.
CoreEraser Technology
Apacer’s Core Eraser Technology provides highly comprehensive
drive sanitization measures, developed to securely and thoroughly
erase data in operating blocks. The CoreEraser comes in three
classes of block sanitizations and can be implemented through
vendor software command or hardware architect.
Class 1: Quick Erase eliminates FAT (File Allocation Table) and the
MBR (Master Boot Record) in LBA that manages partition tables
and boot sector during system start-up process. With both of the
MBR and FAT erased, the drive would appear as uninitialized on
operating system.
Class 2: Full Erase Function has a more comprehensive Quick
Erase, where all contents of the user blocks, free blocks, MBR and
FAT table are erased after the procedure is completed. Drive will be
reinitialized upon the completion of the erase action. The device
will behave as a raw disk as cells in the drive would display “FF”
(or “00”).
Class 3: MIL Erase includes a list of globally certified drive purge
methods that meet the military and industrial standards, such as
NSA 9-12. The process would sanitize the MBR, FAT tables as well
as user & free blocks by erasing the blocks, overwriting with ran-
dom data, then verify. These certified erase features are widely
approved in military applications, while providing confidence in
secure data erase.
CoreProtector
The widespread adoption of SSDs
over HDDs in mission critical applica-
tions may attract potential data theft. In
order to reinforce data security, Apacer intro-
duces the CoreProtector technology that integrates
multiple layers of protection for your valuable data.
Class 1 Data Protect: Apacer SSDs come with a unique 512 byte
Security Key when they leave the factory. The key is activated
whenever the host boots up. The host BIOS can retrieve the
512 byte key data and the host user can use it as password identi-
fication for accessing certain application programs or booting up
process. Failure to match the key will result in aborted operations.
Class 2 Write Protect: Apacer implements the Virtual Write
scheme that allows write commands to go through the flash con-
troller and data temporarily stored. The OS can then function
normally but since the whole process is virtual, no data has actu-
ally been written into the flash. When the host system is reset or
rebooted, all the temporarily stored data will be lost and nowhere
to be found in the system. Since the Virtual Write scheme runs at
device level, it requires no software of driver installation and is
independent from the host OS.
Class 3 Device Protect: Developed as a more comprehensive secu-
rity solution, Device protect can be considered as Write protect
scheme integrated with read protection that prevents unauthor-
ized accesses to read files in the device. When enabled, the Device
Protect scheme would allow read commands to go through flash
controller, but no actual data in the device can be read during the
whole process. Without
the proper way to disable
the protection, unauthor-
ized read attempts would receive
only invalid data, indicated as “FFh”
or “OOh”.
Class 4 Boot Protect: Boot Protect Technology is the ultimate
security class of Apacer CoreProtector series that restricts the unau-
thorized from accessing the computer system. Users can set access
code during the system booting process so that no one else would
be able to access their operating system and SSDs without the cor-
rect access code. Boot Protect technology is also ideally applicable
for SSDs with multiple OS-run storage zones that are independent
from one another. For instance, if a SSD is divided into two storage
zones with OS installed in each, the host can decide which zone to
access by entering the corresponding access code.
38 39| |
Data Storage
Swissbit's Security Solutions
Convenience for developers: The products offer tangible hardware security using a plug and play approach. The flash memory can be
used by any host to store and retrieve data on the cards at high speed. At the same time, various security functions on the card can be
activated to protect any data. IT legislation is very strict regarding requirements for maintaining current technological standards when
it comes to the storage of personal or system-critical data. With the aid of secure Swissbit products, it is very easy to enhance security in
existing products or provide even greater flexibility in new products.
Valuable data such as sensitive files, e-mails, photos, OS images,
firmware updates, log files and audit trails can be protected by
encryption, authentication and specific access protection, and sub-
sequent manipulation can be prevented. Data streams for M2M
communication (IoT), medicine and video surveillance can be
protected against third-party access as confidential data on the
storage medium with the aid of a secure, high speed memory card.
Swissbit's DP (data protection) security product series is based on a
security extension for the Swissbit durabit™ firmware. The Swissbit
Security Interface enables solution providers to build applications
for various platforms. An SDK is available to develop applications
on Windows and Linux PC platforms.
Smart card technology is one of the most reliable technologies for
protecting data, e.g. through secure device login, data encryption,
speech encryption, cloud authentication and many other tech-
niques. The large number of application areas brings about bene-
fits for solution providers such as achieving autonomy with respect
to third parties, extremely high security levels and flexibility.
Typical Areas of Application
Industrial equipment is suffering new threats that require coun-
ter measures. Domains like copy protection, license management,
counterfeit protection, system integrity and data protection now
need responses, that can be easily solved by using Swissbit security
products while data retention and endurance still meet the highest
requirements of industrial customers.
Body-worn Cameras and Dashcams
Mobile police units and vehicles are increasingly being equipped
with cameras. Strong encryption of the data and strong authenti-
cation protect the registered data against loss and unauthorized
access.
More and more organizations that have to do with road traffic, such
as security firms, public transport operators, taxi companies etc.,
register data that could contain personal information and therefore
needs to be protected against falling into the wrong hands. This
requires that the data can only be evaluated by the data protec-
tion officer, and that this is verifiable. Such data can be protected
adequately and risks minimized by separating the registration and
reproduction processes into different roles.
Reliable Boot-up
Secure booting up of devices is required
under circumstances in which there is a
need to ensure that the device in question
always boots up in a particular way or as
configured through a given policy. This is
normally done by means of a CD ROM or
comparable methods.
However, for embedded and IoT devices,
this option is precluded simply on size
grounds. As an alternative, SD and
microSD memory cards with enhanced
functionality can be used. It is also possible
to provide these cards with unique identi-
fiers and define privileges that determine
whether and under which conditions the
data can be read at all.
Of course, the card content can be man-
aged by the card administrator. For criti-
cal infrastructures such as in power stations
or energy distribution networks, legislators
have laid down strict definitions for the
run-time environment and its traceability.
More stringent measures are required in all
cases where human life could be directly or
indirectly threatened. Here, too, hardware-
based system protection is essential.
Copy Protection and License Management
Developing high-quality, sophisticated soft-
ware is expensive. According to the VDMA
(German Mechanical Engineering Industry
Association), the German economy suffers
huge losses in turnover every year.
The protection of intellectual property
includes the need to protect embedded and
IoT devices. In particular, the trend towards
unification of hardware platforms has the
effect of making protection of software the
only means of differentiation between com-
petitors, so that it now has the highest pri-
ority. Protection against copying is consid-
erably enhanced through making access to
storage media content on strong authentica-
tion. Content is only readable within the con-
text of a defined usage scenario, and attacks
are much less likely to succeed.
The unique identification of each storage
device can be enhanced to such an extent
through certificates or encryption that even
when software is misappropriated, it will not
function without a secure memory card. The
aim, therefore, is to provide for enough addi-
tional security through viable means with-
out unreasonably increasing product and
processing costs during the life-cycle stages.
Protection of Personal / Patient Data
Patient data and other personal data must
be given the highest level of protection. It
must be clear at all times who is autho-
rized to access which data in which role.
This clearly includes the adoption of mea-
sures against uncontrolled data loss, but
also intra-organizational and customer
processes such as maintenance, servic-
ing, usage and configuration.
Data protection legislation varies from
country to country. However, the trace-
ability of data processing and the imple-
mentation of current technological stan-
dards represent a common denominator.
These requirements can be fulfilled read-
ily through the use of hardware-based
security measures.
In Germany, the legal requirements are
laid down in the Bundesdatenschutzge-
setz (Federal Data Protection Act, BDSG).
Application Areas Type SE Standard Edition VE Voice Edition FE FIPS Edition PE Premium Edition DP Data Protection
Mobile / PC PS-100u micro SD 8 GB – 16 GB 8 GB – 16 GB 8 GB – 16 GB – 8 GB – 32 GB
Medical Automotive
PS-45 SD 8 GB – 16 GB 8 GB – 16 GB 8 GB – 16 GB 8 GB – 16 GB 8 GB – 64 GB
PS-45u micro SD 8 GB – 16 GB 8 GB – 16 GB 8 GB – 16 GB 8 GB – 16 GB 8 GB – 32 GB
Industrial
PS-450 SD 4 GB – 32 GB 4 GB – 32 GB 4 GB – 32 GB 4 GB – 32 GB 4 GB – 32 GB
PS-450u microSD 0.5 GB – 2 GB 0.5 GB – 2 GB 0.5 GB – 2 GB 0.5 GB – 2 GB 0.5 GB – 2 GB
40 41| |
Data Storage
Transcend’s Hardware-based AES Solution
For applications that handle especially sensitive data or require special levels of confidentiality, Transcend offers hardware-based AES
encryption on several SSD models for various 2.5”, M.2, and mSATA models.
Transcend Information’s SSDs equipped with hardware-based AES
encryption offer considerably more professional data protection
and performance compared to alternative programs that utilize
software-based or firmware-based encryption.
With hardware-based encryption, all data is encrypted before being
stored in NAND flash memory (See Figure 1). After the encrypted
data has been written into the flash memory, it becomes virtually
impossible to decrypt the data without the original encryption key.
Performance is also improved compared to software-based solu-
tions, since hardware-based encryption does not require system
resources to perform the encryption/decryption process.
Transcend Information offers a variety of SSDs equipped with
hardware-based AES encryption, thereby enabling reliable han-
dling of sensitive data and enhanced data security.
From securing personal data, such as credit card information or
medical records, to protecting sensitive corporate information,
Transcend Information’s SSDs with hardware-based encryption
mechanisms provide an excellent solution that guarantees data
protection.
TCG OPAL Specifications
The Trusted Computing Group (TCG) is an organization whose
members work together to formulate industry standards with the
intention that these should enjoy cross-industry validity.
TCG’s Storage Work Group created the Opal Security Subsystem
Class (SSC) as a class of security management protocols for storage
devices. It applies mainly to products used in PCs and notebooks.
The class defines specifications concerning file management on
storage devices, and defines multi-stage access levels for data man-
agement and protection. Devices conforming to Opal SSC speci-
fications may be referred to as TCG Opal devices, a mark of trust-
worthiness.
TCG Opal Features
Opal is a comprehensive set of guidelines. The target audience
includes manufacturers of storage devices, software vendors, sys-
tem integrators, and academia. These specifications cover the man-
ufacture of storage devices, system setup, management, administra-
tion, and use. They require password protection and hierarchical
storage management in order to guarantee data security and pro-
tection.
Advantages of Opal
1. In a hierarchically managed system, access privileges can be
assigned to certain persons by means of passwords. This mini-
mizes the chance of data being stolen, tampered with, or lost.
2. All security functions take place within the device itself. They
do not need to pass through the host operating system. They do
not exploit system resources, making for faster and more secure
execution. In addition, compatibility problems can no longer arise.
Storage devices comply with Opal SSC specifications when they
display the following characteristics:
1. Self-encryption: Data encryption is performed directly on the
device (hardware encryption) and not via the host (software
encryption) outside the device. The encryption key is also stored
directly on the device, commonly in the form of an AES key.
2. Supports boot authentication: When the user starts the device, a
superordinate MBR (Master Boot Record) carries out pre-boot
authentication; if the user is cleared, the normal boot process
begins and connections to devices are made. See Figure 2.
3. Sector-specific access privileges: The device manager may create
separately addressable sector ranges using logical block address-
ing (LBA) and assign different privileges for each range. Only
users with the correct key for a particular LBA range may per-
form certain actions. Where locations on the medium are pass-
word-protected, only users with the correct key will be granted
authorized access. See Figure 3.
With increasing volumes of data, information security is becom-
ing one of the most important issues for both business and private
users. The TCG designed Opal to address both software and hard-
ware aspects of security, and take account of the need for hierarchi-
cal management approaches. From the manufacturer to the user,
Opal is a standard that serves the needs of everyone.
Transcend’s AES SSDs are compliant with the TCG Opal 2.0 stan-
dards, and can be customized to meet specific customer needs as
required.
Figure 1
Figure 3
Figure 2
42 43| |
Data Storage
Transcend’s Hardware-based AES Solution
Hardware Purge
In addition to data encryption, Transcend Information offers a
variety of SATA III SSD models that can be equipped with a hard-
ware purge function, ensuring quick and irrevocable erasure of data.
Hardware purge refers to the effective, hardware-based erasure of
all data blocks in flash memory, which returns the SSD to its origi-
nal state at the time of manufacture.
Whereas software-based methods utilize the ATA ‘erase’ com-
mand to delete data, a hardware purge constitutes a different kind
of access via an external switch that is connected with the control-
ler’s General Purpose Input/Output (GPIO) interfaces. Here, the
voltage levels of all the installed flash memory units are switched
from High to Low at the same time.
Locking Down Firmware
Firmware is a very attractive target for
cybercriminals, because it cannot be
scanned by anti-virus programs.
Therefore the ‘Secure Download and Diag-
nostics’ feature is now standard on every
Seagate hard disk. It prevents unauthor-
ized access to the firmware of a drive, as
well as preventing manipulation of execut-
able firmware code and sensitive system-
level data.
Therefore customers can be sure that the
devices are free of malware, and provide
evidence of this to authorities.
The erase function is activated and all data present on the SSD
is simultaneously deleted through short-circuiting the hardware
purge pins (see Figure 1). Erased data is absolutely non-recoverable,
meaning that this procedure reliably and irrevocably destroys con-
fidential information.
The hardware purge pin is connected to the designated pin of the
controller’s GPIO (see Figure 2). Customized firmware settings are
required to support the hardware purge pin.
With Transcend’s hardware purge feature, sensitive data can be
securely, permanently and effectively deleted.
Simple Data Deletion
Prior to Disposal
Companies and institutions are responsible
for the entire life cycle of the personal data
in their possession, from its initial acquisi-
tion until its deletion. So what actually hap-
pens when a storage medium reaches the
end of its service life?
Overwriting data on such a medium is
expensive and can block valuable resources
for days at a time. Demagnetization of
media is complicated and risky. Physically
shredding media is expensive, environ-
mentally questionable and also involves a
lot of effort. Long-term storage of media at
another location is expensive and also risky.
The intelligent solution is called Seagate
Instant Secure Erase. It is part of the Sea-
Tools suite and is an aid to IT specialists
involved in data deletion and media saniti-
zation. It provides for secure, fast and prob-
lem-free disposal of storage media.
Ha
rd
w
ar
e
pu
rg
e
pi
n
Figure 1 Figure 2
Ha
rd
w
ar
e
pu
rg
e
co
nn
ec
to
r
Encryption
Encryption keeps data protected even in
cases where a hard disk is lost, gets stolen
or misplaced. Also, your customers can
minimize the risks for the affected persons,
and this plays a major role when it comes
to weighing up whether the authorities
have to be informed or not. Seagate's self-
encrypting storage media can delete the key
required for decryption, so that all the data
on a disk are rendered illegible in less than
one second. Subsequently, the disk can be
returned, reused or disposed of without any
risk. Also, self-encrypting hard disks lock
down automatically as soon as they are
removed from a system, or when the disk
or the system is switched off. This repre-
sents an additional degree of protection for
the stored data.
Data Storage
Seagate's Security Solution
44 45| |
Intel® AES New Instructions (Intel® AES NI)
■ Encryption instruction set for improvement and acceleration
of AES data encryption in hardware with Intel® Xeon® an Core™
processor families
■ Implemented intensive sub-steps of AES algorithm in hardware
■ Strengthens and accelerates execution of AES applications
■ Accelerate encryption and decryption
■ Improve key generation and matrix manipulation
■ Minimizes application performance concerns inherent in
traditional cryptographic processing
■ Provides enhanced security by addressing side channel attacks
on AES associated with traditional software methods of table
look-ups
Best Way to Secure Business-critical Data Within
the Following Fields:
■ Network traffic
■ Personal data
■ Corporate IT infrastucture
Intel® Memory Protection Extensions (Intel® MPX)
■ Set of extensions to the x86 instruction set architecture
■ With compiler, runtime library and operating system support
■ Brings increased security to software by checking pointer refe-
rences whose normal compile-time intentions are maliciously
exploited at runtime due to buffer overflows
■ Two-level address translation is used for storing bounds in
memory
■ Top layer consists of a Bounds Directory (BD) created on the
application startup
■ Each BD entry is either empty or contains a pointer to a
dynamically created Bounds Table (BT), which in turn
contains a set of pointer bounds along with the linear
addresses of the pointers
■ Bounds load (BNDLDX) and store (BNDSTX) instructions
transparently perform the address translation and access
bounds in the proper BT entry
Architecture Includes Two Configuration Registers
■ BNDCFGx
■ BNDCFGU in user space
■ BNDCFGS in Kernel
■ BNDSTATUS status register
■ Provides a memory address
■ Provides an error code
Central Processing Unit Security
Intel® Execute Disable Bit
■ Security feature that can help to reduce system exposure
to viruses
■ Allows the processor to classify areas in memory where
application code can or cannot execute
■ When code wants to insert in the buffer, the processor disables
code execution, preventing damage and worm propagation
■ Usage needs a PC or server with a processor with Execute
Disable Bit capability and a supporting operating system
Intel® Trusted Execution Technology (Intel® TXT)
■ Hardware-based Technology for enhancing Server Platform
Security
■ High virtualized increased data center or high workloads
will be shared across physical infrastructure
■ More trusted infrastructure is the key to maintain the
assurance and controlling
■ Visibility of the security and workloads within the data center
■ New control capabilities
Data Processing
These days it is not a matter of “if ” but when private data begins to roam outside of your secure perimeter. In 2016 there were over
1.3 billion registered data breaches and with the new European data protection regulation to be introduced in 2018, it becomes even
more essential to protect users identity, to prevent and detect malware, to protect your data and have resiliency and recovery features.
Intel has numerous hardware- and software-based solutions that address security issues and help reduce data compromise and data loss,
providing protection at the point of creation and throughout the data lifecycle.
Intel® Secure Key
■ Intel® 64 Architecture instruction RDRAND and its underlying
Digital Random Number Generator (DRNG) hardware
implementation
■ RDSEED instruction is part of the Intel® Secure Key
■ Digital Random Number Generator is a key enabler for
Information Security Applications
■ Cryptographic protocols rely on RNGs for generating keys and
fresh session values to prevent replay attacks
■ Can be used to fix this weakness, thus significantly increasing
cryptographic robustness
■ RDRAND has been engineered to meet existing security
standards and can be used in general for information security
standards
Other Uses of Digital Random Number Generation Include
■ Communication
■ Gaming
■ Secure disk wiping or document shredding
■ Protecting online services against RNG attacks
46 47| |
Intel® Transactional Syncronization Extensions –
New Instructions (TSX-NI)
■ Programmer-specified code regions are executed transactional
■ Memory operations will appear and be occurred when viewed
from other logical processors, after successful execution
■ A processor makes architectural updates performed within the
region visible to other logical processors only on a successful
commit, a process referred to as an atomic commit
■ Serialization through lock-protected critical section if required
■ Synchronization of hidden applications with exposing
Intel® ECC Memory Support
■ Detect and correct the internal data corruption
■ ECC memory maintains a memory system immune to single-bit
errors
■ Data that is read from each word is always the same as the data
that had been written to it, even if one or more bits actually
stored have been flipped to the wrong state
■ Most non-ECC memory cannot detect errors although some
non-ECC memory with parity support allows detection but not
correction
■ Supported by integrated memory controller at Intel® Xeon®
processors and some application specific Intel® Atom processors
Intel® vPro™ Technology
■ Allows PCs to be fixed and maintained remotely
■ Service providers can use vPro to solve problems after entering
a key sequence
■ Ability to access a computer even if it has been turned off within
a wired or secure wireless network
■ Laptops outside the internal network can be accessed with the
newest versions of software
■ Possibility for remotely operating system security patches and
BIOS updates
Intel® Software Guard Extensions (Intel® SGX)
■ Intel technology for application developers who are seeking to
protect selected code and data from disclosure or modification
■ Protection possible through the use of enclaves, which are
protected areas of execution in memory
■ Application code can be put into an enclave by special instructions
■ Software is available to developers via the Intel® SGX Software
Development Kit (SDK)
■ Collection of APIs, libraries, documentation, sample source
code, and tools that allows software developers to create and
debug Intel SGX enabled applications in C and C++
Application Code Executing Within an Intel SGX Enclave
■ Introduced with 7th generation of Intel Core and Xeon E3 v5
processors for data center servers
■ Usage of the full processor power possible
■ Possibility of cold boot
■ Uses hardware-based mechanisms to respond to remote
attestation challenges that validate its integrity
■ Synchronization with parent application
■ Can be used with standard development tools
■ Supports initial data center use
Data Processing
Central Processing Unit Security
Intel® Boot Guard
■ Provides reliable information about the state of the system
■ Hardware implemented
■ Processor is called Trusted Platform Module (TPM)
■ First verification of signatures happens by code on the CPU
■ Possibility to emulate a “properly” booted system
■ A key which is written in the CPU makes it possible to lock
down the boot block
■ In "Measured Boot" mode, Boot Guard creates a hash over the
bootblock and sends it off to the TPM
■ Value is stored in TPM registers, which aren't writable by code
running on CPU
■ Supposed to prevent replay attacks with possibility to fake a
certain Boot Guard state if an attacker manages to disable Boot
Guard altogether
Intel® Identity-Protection-Technology
■ Will be managed with hardware based certificates and PIN for
a safe Protected-Transaction-Display (PTD)
■ With multifactor-authentification (MFA)
■ Framework for the basis of identification and access manage-
ment, which could be integrated in the IT-infrastructure
■ Flexibility in access management for different users and
applications
■ MFA Engine based on the firmware guarantees the given access
■ The authentication occurs between user, system and network
■ „Walk-Away Lock“: Bluetooth device connected to the PC for
ability to block and unblock the system
■ „Domain/OS-Login“: required key for the system login saved in
the hardware, which secures the user, system and network for
malware attacks
■ „VPN-Login“: similar to “Domain/OS-Login” secures the
hardware based VPN-authentication and system from malware
due to file all relevant keys in the hardware
48 49| |
Data Processing
Central Processing Unit Security
Type
Intel Atom®
x5-E8000
Processor
Intel Atom®
x5-E3930
Processor
Intel Atom®
x5-E3940
Processor
Intel Atom®
x7-E3950
Processor
Code Name Braswell Apollo Lake Apollo Lake Apollo Lake
Essentials
Vertical Segment Embedded Embedded Embedded Embedded
Processor Number E8000 E3930 E3940 E3950
Lithography 14 nm 14 nm 14 nm 14 nm
Performance
# of Cores 4 2 4 4
# of Threads 4 2 4 4
Base Frequency 1.04 GHz 1.30 GHz 1.60 GHz 1.60 GHz
TDP 5 W 6.5 W 9.5 W 12 W
Memory Specifications
Memory Types DDR3L DDR3L; LPDDR4
DDR3L;
LPDDR4 DDR3L; LPDDR4
ECC Memory
Supported No Yes Yes Yes
Graphics Specifications
Processor Graphics Intel
® HD
Graphics
Intel® HD Gra-
phics 500
Intel® HD Gra-
phics 500
Intel® HD Gra-
phics 505
Package Specifications
Sockets Supported FCBGA1170
Package Size 25 mm x 27 mm
24 mm x
31 mm
24 mm x
31 mm 24 mm x 31 mm
Operating Tempera-
ture Range
-40°C to
85°C
-40°C to
85°C -40°C to 85°C
Advanced Technologies
Intel® Virtualization
Technology (VT-x) Yes Yes Yes Yes
Intel® Virtualization
Technology (VT-d) No Yes Yes Yes
Intel® VT-x with EPT Yes Yes Yes Yes
Intel® 64 Yes Yes Yes Yes
Instruction Set 64 bit 64 bit 64 bit 64 bit
Security & Reliability
Intel® AES New
Instructions Yes Yes Yes Yes
Secure Key Yes Yes Yes Yes
Secure Boot No Yes Yes Yes
Execute Disable Bit Yes Yes Yes Yes
Intel® Identity Pro-
tection Technology Yes Yes Yes Yes
Type
Intel®
Celeron®
Processor
3965U
Intel®
Celeron®
Processor
N3350
Intel®
Celeron®
Processor
N3160
Intel®
Celeron®
Processor
N3060
Intel®
Celeron®
Processor
N3010
Intel®
Celeron®
Processor
G3900E
Intel®
Celeron®
Processor
G3902E
Intel®
Celeron®
Processor
G3930E
Intel®
Celeron®
Processor
G3930TE
Code Name Kaby Lake Apollo Lake Braswell Braswell Braswell Skylake Skylake Kaby Lake Kaby Lake
Essentials
Vertical Segment Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded
Processor Number 3965U N3350 N3160 N3060 N3010 G3900E G3902E G3930E G3930TE
Lithography 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm
Performance
# of Cores 2 2 4 2 2 2 2 2 2
# of Threads 2 2 4 2 2 2 2 2 2
Processor Base Frequency 2.20 GHz 1.10 GHz 1.60 GHz 1.60 GHz 1.04 GHz 2.40 GHz 1.60 GHz 2.90 GHz 2.70 GHz
TDP 15 W 6 W 6 W 6 W 4 W 35 W 25 W 54 W 35 W
Memory Specifications
Memory Types
DDR4,
LPDDR3,
DDR3L
DDR3L,
LPDDR3,
LPDDR4
DDR3L DDR3L DDR3L DDR4, DDR3L DDR4, DDR3L DDR4, DDR3L DDR4, DDR3L
ECC Memory Supported No No No No No Yes Yes Yes Yes
Graphics Specifications
Processor Graphics Intel
® HD
Graphics 610
Intel® HD
Graphics 500
Intel® HD
Graphics 400
Intel® HD
Graphics 400
Intel® HD
Graphics 400
Intel® HD
Graphics 510
Intel® HD
Graphics 510
Intel® HD
Graphics 610
Intel® HD
Graphics 610
Package Specifications
Sockets Supported FCBGA1356 FCBGA1296 FCBGA1170 FCBGA1170 FCBGA1170 FCBGA1440 FCBGA1440 FCLGA1151 FCLGA1151
Package Size 42 mm X 24 mm
24 mm x
31 mm
25 mm x
27 mm
25 mm x
27 mm
25 mm x
27 mm
42 mm x
28 mm
42 mm x
28 mm
37.5 mm x
37.5 mm
37.5 mm x
37.5 mm
Advanced Technologies
Intel® Virtualization
Technology (VT-x) Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Virtualization
Technology (VT-d) Yes Yes No No No Yes Yes Yes Yes
Intel® VT-x with EPT Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® 64 Yes Yes Yes Yes Yes Yes Yes Yes Yes
Instruction Set 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit
Security & Reliability
Intel® AES New Instructions Yes Yes Yes Yes Yes Yes Yes Yes Yes
Secure Key Yes Yes Yes Yes Yes Yes Yes Yes Yes
Secure Boot No Yes Yes Yes Yes No No No No
Intel® Software Guard
Extensions (Intel® SGX) Yes No No No No Yes Yes Yes Yes
Intel® Memory Protection
Extensions (Intel® MPX) Yes No No No No No No Yes Yes
Intel® Trusted Execution
Technology No No No No No No No No No
Execute Disable Bit Yes Yes Yes Yes Yes Yes Yes Yes Yes
OS Guard Yes No No No No No No Yes Yes
Intel® Identity Protection
Technology No Yes Yes Yes Yes No No Yes Yes
Intel® Device Protection
Technology with Boot Guard No No No No No Yes Yes Yes Yes
Type
Intel® Pentium®
Processor
N3710
Intel® Pentium®
Processor
N4200
Code Name Braswell Apollo Lake
Essentials
Vertical Segment Embedded Embedded
Processor Number N3710 N4200
Lithography 14 nm 14 nm
Performance
# of Cores 4 4
# of Threads 4 4
Processor Base Frequency 1.60 GHz 1.10 GHz
TDP 6 W 6 W
Memory Specifications
Memory Types DDR3 DDR3L, LPDDR4
ECC Memory Supported ‡ No No
Graphics Specifications
Processor Graphics Intel
® HD Graphics
405
Intel® HD Graphics
505
Package Specifications
Sockets Supported FCBGA1170 FCBGA1296
Package Size 25 mm x 27 mm 24 mm x 31 mm
Advanced Technologies
Intel® Virtualization Technology (VT-x) Yes Yes
Intel® Virtualization Technology (VT-d) No Yes
Intel® VT-x with EPT Yes Yes
Intel® 64 Yes Yes
Instruction Set 64 bit 64 bit
Intel® Identity Protection Technology Yes Yes
Security & Reliability
Intel® AES New Instructions Yes Yes
Secure Boot Yes Yes
Secure Key Yes Yes
Execute Disable Bit Yes Yes
Intel® Atom® Embedded Intel® Celeron® EmbeddedIntel® Pentium® Embedded
50 51| |
Type
Intel® Core™
i3-7100U
Processor
Intel® Core™
i3-7100E
Processor
Intel® Core™
i3-7101TE
Processor
Intel® Core™
i3-7101E
Processor
Intel® Core™
i3-7102E
Processor
Intel® Core™
i5-7300U
Processor
Intel® Core™
i5-7440EQ
Processor
Intel® Core™
i5-7442EQ
Processor
Intel® Core™
i5-7500T
Processor
Intel® Core™
i5-7500
Processor
Intel® Core™
i7-7600U
Processor
Intel® Core™
i7-7700T
Processor
Intel® Core™
i7-7700
Processor
Intel® Core™
i7-7820EQ
Processor
Code Name Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake
Essentials
Vertical Segment Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded Embedded
Processor Number i3-7100U i3-7100E i3-7101TE i3-7101E i3-7102E i5-7300U i5-7440EQ i5-7442EQ i5-7500T i5-7500 i7-7600U i7-7700T i7-7700 i7-7820EQ
Lithography 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm
Performance
# of Cores 2 2 2 2 2 2 4 4 4 4 2 4 4 4
# of Threads 4 4 4 4 4 4 4 4 4 4 4 8 8 8
Processor Base Frequency 2.40 GHz 2.90 GHz 3.40 GHz 3.90 GHz 2.10 GHz 2.60 GHz 2.90 GHz 2.10 GHz 2.70 GHz 3.40 GHz 2.80 GHz 2.90 GHz 3.60 GHz 3.00 GHz
TDP 15 W 35 W 35 W 54 W 25 W 15 W 45 W 25 W 35 W 65 W 15 W 35 W 65 W 45 W
Memory Specifications
Memory Types DDR4, LPDDR3, DDR3L DDR4 DDR3L, DDR4 DDR3L, DDR4 DDR4
DDR4, LPDDR3,
DDR3L DDR4 DDR4 DDR4, DDR3L DDR4, DDR3L DDR4, LPDDR3 DDR4, DDR3L DDR4, DDR3L DDR4
ECC Memory Supported No Yes Yes Yes Yes No No No No No No No No No
Graphics Specifications
Processor Graphics Intel
® HD Graphics
620
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
620
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
620
Intel® HD Graphics
630
Intel® HD Graphics
630
Intel® HD Graphics
630
Package Specifications
Sockets Supported FCBGA1356 FCBGA1440 FCLGA1151 FCLGA1151 FCBGA1440 FCBGA1356 FCBGA1440 FCBGA1440 FCLGA1151 FCLGA1151 FCBGA1356 FCLGA1151 FCLGA1151 FCBGA1440
Package Size 42 mm X 24 mm 42 mm x 28 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 42 mm x 28 mm 42 mm X 24 mm 42 mm x 28 mm 42 mm x 28 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 42 mm X 24 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 42 mm x 28 mm
Advanced Technologies
Intel® vPro™ Technology No No No No No Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Virtualization Technology (VT-x) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Virtualization Technology (VT-d) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® VT-x with EPT Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® TSX-NI No No No No No Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® 64 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Instruction Set 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit
Security & Reliability
Intel® AES New Instructions Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Secure Key Yes No No No No Yes No No Yes Yes Yes Yes Yes No
Secure Boot No Yes No No Yes No Yes Yes No No No No No Yes
Intel® Software Guard Extensions (Intel® SGX) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Memory Protection Extensions (Intel® MPX) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Trusted Execution Technology No No No No No Yes Yes Yes Yes Yes Yes Yes Yes Yes
Execute Disable Bit Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
OS Guard Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Stable Image Platform Program (SIPP) No No No No No Yes No No Yes Yes Yes Yes Yes No
Intel® Identity Protection Technology Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Device Protection Technology with Boot
Guard No Yes Yes Yes Yes No Yes Yes Yes Yes No Yes Yes Yes
Intel® Core™ Embedded
Data Processing
Central Processing Unit Security
52 53| |
Intel® Xeon® E3 Embedded Intel® Xeon® D Embedded
Type
Intel® Xeon®
Processor
E3-1505M v6
Intel® Xeon®
Processor
E3-1505L v6
Intel® Xeon®
Processor
E3-1501L v6
Intel® Xeon®
Processor
E3-1501M v6
Intel® Xeon®
Processor
E3-1275 v6
Code Name Kaby Lake Kaby Lake Kaby Lake Kaby Lake Kaby Lake
Essentials
Vertical Segment Embedded Embedded Embedded Embedded Embedded
Processor Number E3-1505MV6 E3-1505LV6 E3-1501LV6 E3-1501MV6 E3-1275V6
Lithography 14 nm 14 nm 14 nm 14 nm 14 nm
Performance
# of Cores 4 4 4 4 4
# of Threads 8 8 4 4 8
Processor Base Frequency 3.00 GHz 2.20 GHz 2.10 GHz 2.90 GHz 3.80 GHz
TDP 45 W 25 W 25 W 45 W 73 W
Memory Specifications
Memory Types DDR4, LPDDR3, DDR3L DDR4 DDR4 DDR4 DDR4, DDR3L
ECC Memory Supported Yes Yes Yes Yes Yes
Graphics Specifications
Processor Graphics Intel
® HD Graphics
P630
Intel® HD Graphics
P630
Intel® HD Graphics
P630
Intel® HD Graphics
P630
Intel® HD Graphics
P630
Package Specifications
Sockets Supported FCBGA1440 FCBGA1440 FCLGA1151
Package Size 42 mm x 28 mm 42 mm x 28 mm 42 mm x 28 mm 42 mm x 28 mm 37.5 mm x 37.5 mm
Advanced Technologies
Intel® vPro™ Technology Yes Yes Yes Yes Yes
Intel® Hyper-Threading Technology Yes Yes No No Yes
Intel® Virtualization Technology (VT-x) Yes Yes Yes Yes Yes
Intel® Virtualization Technology (VT-d) Yes Yes Yes Yes Yes
Intel® VT-x with EPT Yes Yes Yes Yes Yes
Intel® TSX-NI Yes Yes Yes Yes Yes
Intel® 64 Yes Yes Yes Yes Yes
Instruction Set 64 bit 64 bit 64 bit 64 bit 64 bit
Security & Reliability
Intel® AES New Instructions Yes Yes Yes Yes Yes
Secure Key Yes Yes Yes Yes Yes
Intel® Software Guard Extensions (Intel® SGX) Yes Yes Yes Yes Yes
Intel® Memory Protection Extensions (Intel® MPX) Yes Yes Yes Yes Yes
Intel® Trusted Execution Technology Yes Yes Yes Yes Yes
Execute Disable Bit Yes Yes Yes Yes Yes
OS Guard Yes Yes Yes Yes Yes
Intel® Identity Protection Technology Yes Yes No Yes No
Intel® Stable Image Platform Program (SIPP) Yes No No No No
Intel® Device Protection Technology with Boot Guard No No No No Yes
Type
Intel® Xeon®
Processor
D-1529
Intel® Xeon®
Processor
D-1539
Intel® Xeon®
Processor
D-1557
Intel® Xeon®
Processor
D-1559
Intel® Xeon®
Processor
D-1567
Intel® Xeon®
Processor
D-1577
Code Name Broadwell Broadwell Broadwell Broadwell Broadwell Broadwell
Essentials
Vertical Segment Embedded Embedded Embedded Embedded Embedded Embedded
Processor Number D-1529 D-1539 D-1557 D-1559 D-1567 D-1577
Lithography 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm
Performance
# of Cores 4 8 12 12 12 16
# of Threads 8 16 24 24 24 32
Processor Base Frequency 1.30 GHz 1.60 GHz 1.50 GHz 1.50 GHz 2.10 GHz 1.30 GHz
TDP 20 W 35 W 45 W 45 W 65 W 45 W
Memory Specifications
Memory Types DDR4, DDR3 DDR4, DDR3 DDR4, DDR3 DDR4, DDR3 DDR4, DDR3 DDR4, DDR3
ECC Memory Supported Yes Yes Yes Yes Yes Yes
Graphics Specifications
Processor Graphics None None None None None None
Package Specifications
Sockets Supported FCBGA1667 FCBGA1667 FCBGA1667 FCBGA1667 FCBGA1667 FCBGA1667
Package Size 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm 37.5 mm x 37.5 mm
Advanced Technologies
Intel® Virtualization Technology (VT-x) Yes Yes Yes Yes Yes Yes
Intel® Virtualization Technology (VT-d) Yes Yes Yes Yes Yes Yes
Intel® VT-x with EPT Yes Yes Yes Yes Yes Yes
Intel® TSX-NI Yes Yes Yes Yes Yes Yes
Intel® 64 Yes Yes Yes Yes Yes Yes
Instruction Set 64 bit 64 bit 64 bit 64 bit 64 bit 64 bit
Security & Reliability
Intel® AES New Instructions Yes Yes Yes Yes Yes Yes
Secure Key Yes Yes Yes Yes Yes Yes
Intel® Trusted Execution Technology Yes Yes Yes Yes Yes Yes
Execute Disable Bit Yes Yes Yes Yes Yes Yes
OS Guard Yes Yes Yes Yes Yes Yes
Data Processing
Central Processing Unit Security
54 55| |
Type
Intel® Xeon®
Platinum
8160T Processor
Intel® Xeon®
Gold
6138T Processor
Intel® Xeon®
Gold
6138 Processor
Intel® Xeon®
Gold
6130T Processor
Intel® Xeon®
Gold
6130 Processor
Intel® Xeon® Gold
6126T Processor
Intel® Xeon®
Gold
6126 Processor
Intel® Xeon®
Gold
5120T Processor
Intel® Xeon®
Gold
5119T Processor
Intel® Xeon®
Gold
5118 Processor
Intel® Xeon®
Silver
4116T Processor
Intel® Xeon®
Silver
4116 Processor
Intel® Xeon®
Silver
4114T Processor
Intel® Xeon®
Silver
4110 Processor
Intel® Xeon®
Silver
4109T Processor
Intel® Xeon®
Bronze
3106 Processor
Code Name Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake Skylake
Essentials
Vertical Segment Server Server Server Server Server Server Server Server Server Server Server Server Server Server Server Server
Processor Number 8160T 6138T 6138 6130T 6130 6126T 6126 5120T 5119T 5118 4116T 4116 4114T 4110 4109T 3106
Lithography 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm 14 nm
Performance
# of Cores 24 20 20 16 16 12 12 14 14 12 12 12 10 8 8 8
# of Threads 48 40 40 32 32 24 24 28 28 24 24 24 20 16 16 8
Processor Base Frequency 2.10 GHz 2.00 GHz 2.00 GHz 2.10 GHz 2.10 GHz 2.60 GHz 2.60 GHz 2.20 GHz 1.90 GHz 2.30 GHz 2.10 GHz 2.10 GHz 2.20 GHz 2.10 GHz 2.00 GHz 1.70 GHz
TDP 150 W 125 W 125 W 125 W 125 W 125 W 125 W 105 W 85 W 105 W 85 W 85 W 85 W 85 W 70 W 85 W
Memory Specifications
Memory Types DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4 DDR4
ECC Memory Supported Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Package Specifications
Sockets Supported FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647 FCLGA3647
Package Size 76.0 mm x 56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
76.0 mm x
56.5 mm
Advanced Technologies
Intel® vPro™ Technology Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Virtualization Technology (VT-x) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® TSX-NI Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® 64 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Security & Reliability
Intel® AES New Instructions Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Trusted Execution Technology Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Intel® Run Sure Technology Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Mode-based Execute Control (MBE) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Execute Disable Bit Yes Yes Yes
Intel® Xeon® Scalable Processors
Data Processing
Central Processing Unit Security
56 57| |
Secure Boot
F&S makes it easy to get a higher security level for your application. The key is Secure Boot. Secure Boot ensures that only genuine or
authentic software is allowed to run on your board. Furthermore, it supports encrypted boot including image cloning protection and,
depending on the use case, image confidentiality. In short, using Secure Boot on your platform prevents hackers from altering the boot
process.
Data Processing
Security on ARM Based Embedded Boards
F&S provides two different offers for the Secure Boot:
■ Secure Boot as a Service
Signing and Encrypting of the images will be managed by F&S
■ Secure Boot as a Package
Signing and Encrypting of the images will be managed
by customer
Secure Boot is the concept of protecting the system from manipu-
lation and the software from decrypting. Both procedures can be
used for the boot loader as well as for the device tree and kernel.
The software developed by F&S makes the software of NXP
simplify the process of signing and encryption.
Userland
NBoot
Linux Kernel
UBoot
Userland
WinEC Kernel
EBoot
CPU ROM Loader
Secure Boot library
Protection of Intellectual Property
■ Boot code cannot be read out
Protection against Manipulation
■ Only certified software is accepted
No Break of Security
F3S – Failsafe Flash Filesystem
The Failsafe Flash Filesystem is a filesystem that is especially
designed to be robust against (abrupt) electrical power outages.
Data modifications of a file will be written in several, definable
transactions, where each change only will be committed com-
pletely. Unfinished operations will be revoked. It’s designed for
NAND-Flash-Memories particularly. In contrary to other file sys-
tems it is able to guarantee a reliability in transaction on file-level.
The user has the option to define the point of validation of modi-
fied data, in easiest case by closing the file-handle. In this way
important data can be stored permanently and safely.
Features
■ Modifying file contents can be accepted only in completed
operations (state-transition)
■ During modification transitions can also be accomplished by
using explicit calls within the application (FlushFileBuffers)
Secure Boot as a Service
This additional functionality is available with Linux only.
F&S needs nboot, uboot, device tree and kernel image from
the customer and of course the order for the one-off costs.
Customers get 2 pieces of samples for test and confirmation. If
the con firmation sheet (signed from the customer) is available,
customer can order boards for mass production.
Boards with Secure Boot enabled from F&S, only run with
certified images. Any other images which are not signed or
corrupted can't be downloaded or saved on the board. If the
customer wants to update the software, he must send the Soft-
ware back to F&S. F&S will create a certified image and send it
back to the customer. Then the customer can update the soft-
ware by himself.
Secure Boot as a Service
58 59| |
Data Processing
Security Features on Standard x86 Based Boards
WATCH DOG
PC systems can use the "WATCHDOG" function. The term "WATCHDOG" is usually used for a component of a system that monitors
the function of other components. If a possible fault is detected, it is either signaled according to the system agreement or a correspond-
ing step instruction is initiated which corrects the current problem. The signal or jumper commands directly serve as a trigger for other
co-operating system components to solve the problem. The integrated controllers are completely independent of CPU and software.
For this reason, the WATCHDOG can act as a reliable monitor to monitor the regular WATCHDOG RESET event that must be per-
formed by operating system tasks or by the SystemGuard utility. If the retrigger events do not arrive in time, a malfunction of hardware
or software must be accepted, then the system is restarted.
Benefits
■ Additional reliability
■ The watchdog itself is independent of the operating system
and any application software
■ Additional BIOS POST watchdog and/or BIOS BOOT
watchdog
■ Easy set-up of watchdog functionality possible via BIOS
setup and SystemGuard utility
■ Integration into customer applications through program-
ming interface
There are several WATCHDOG functions possible:
■ Hardware-WATCHDOG
The Hardware-WATCHDOG is integrated into the Microcon-
troller or placed on the PCB as an independent unit.
■ Time-Out WATCHDOG
The controller must report to WATCHDOG before a specified
time has elapsed. If the time has elapsed, a reset of the control-
ler is triggered. If the WATCHDOG is integrated in the con-
troller, a so-called trap can also be triggered. The task of the
software module assigned to the trap is to provide a suitable
response to save the WATCHDOG problem and to put the sys-
tem in a safe state. This is followed by a partial or complete restart.
■ Time-Slot-WATCHDOG
At this WATCHDOG the microcontroller has to communicate
with the WATCHDOG between a defined time slot. The reaction at
none communication is the same as by Time-Out-WATCHDOG.
■ Intelligent-WATCHDOG
In the intelligent WATCHDOG, the controller must answer
a question posed by a WATCHDOG module. The process is
also referred to as a challenge-response concept for the reason.
In the event of an error, the controller is reset and the WATCH-
DOG moves the controller to a safe state.
■ Software-WATCHDOG
The WATCHDOG software is a test software in the controller.
The software module checks whether all important program
modules are executed correctly within a specified time frame or
whether a module requires an unacceptable length of time for the
processing. This does not necessarily have to be caused by a faulty
processing, but can also be caused by a deadlock. The software
WATCHDOG can be monitored by a hardware watchdog
Mainboard BIOS POST WATCHDOG
BIOS Boot
WATCHDOG
OS
WATCHDOG
D3313-S X X
D343x-S X X X
D344x-S X X X
D3417-B X X X
D3402-B X X X
D3598-B X X X
Supported Mainboards
Fujitsu implements the following three various WATCHDOGs
■ BIOS POST WATCHDOG
■ BIOS (OS) Boot WATCHDOG
■ Operating System Runtime WATCHDOG
Please note, that the implementation of the various
WATCHDOG features depends on the mainboard model.
All three WATCHDOGS are physical identical, but they are
handled by different application levels.
The mainboards provide full BIOS POST-, Operating System
Boot-, and Operating System-Runtime watchdog supervision.
How to handle the different WATCHDOG levels?
■ BIOS POST WATCHDOG
■ No user interaction possible
■ POST WATCHDOG is always enabled
■ BIOS Boot WATCHDOG
■ Set WATCHDOG in BIOS Setup
0 = WD disabled
1–255 = WD enabled (timeout = 1–255 minutes)
■ OS WATCHDOG
■ Use “WATCHDOG software agent” to stop or retrigger
the WATCHDOG during OS runtime
The following diagram shows the sequence after powering on the system
60 61| |
Erase Disk
Erase Disk is a Fujitsu Technology Solutions feature embedded in the system firmware to erase all data reliably from a hard disk. The main
purpose of this feature is to delete all data from the hard disk before it will be changed or the complete system will be sold. It can be also
used whenever a hard disk should be deleted, for example before a new operating system will be installed.
Full Disk Encryption
Full disk encryption (FDE) is a security tool whereby every bit of data is encrypted on the hard disk drive. Encryption involves converting
information into unreadable code, which cannot be deciphered easily by unauthorized users. Thus full disk encryption prevents unau-
thorized access to the stored data.
FUJITSU OEM Mainboards are able to support this feature which is mainly a HDD feature.
Trusted Platform Module
Trusted Platform Module (TPM) is a security feature available on selected Fujitsu OEM Mainboards. The TPM itself is a computer chip
(microcontroller) which securely stores information, such as passwords, certificates or encryption keys, used to authenticate your PC or
laptop. A TPM can also store information regarding your PC or laptop, enabling you to determine whether your device is trustworthy
and has not been breached.
All Fujitsu Skylake-based mainboards provide TPM V2.0 as recommended for MS Windows 10.
The great benefits against other software are
Description
This application itself is called EraseDisk and it is a part of the UEFI Firmware at the end of the PowerOnSelfTest (POST).
To erase all data from the hard disk you have to do the following steps
1. The application can only be selected and deleted if you have set an Admin password
2. Start the BIOS and set the switch from EraseDisk to enable. After reboot you have to enter your admin
password for security purpose
3. A dialog will be displayed which allows you to select a specific, several or all hard disk – depending on the
number of attached hard disks in the system
4. Select a hard disk which shall be deleted
EraseDisk offers you four different options how to delete your hard disk from “fast” to “very secure”
■ Zero Pattern (1 pass) overwrite the flash with “0” in 1 pass
■ German BSI / VSITR (7 pass) 6 pass overwrite with changing numbers, last pass with “010101”
■ DoD 5220.22-M ECE (7 pass) 7 pass overwrite with random numbers, (DoD=Department of Defense)
■ Guttmann (35 pass) 35 pass overwrite with certain values after a certain pattern, not more up today
5. Select hard disk deletion algorithm
After the hard disk deletion process, the user can select as follows which tasks he will be executed by the
system.
■ Reset password
■ Load Setup Defaults
■ Shutdown System
6. Select desired tasks
The deletion process will start now. The complete disk erase can be recorded as an audit proof protocol and
copied to an external USB drive.
Depending on the selected algorithm the duration ranges from 10 sec. until 10 min. per GByte.
No additional cost, because it is included in the system A part of the BIOS can't get lost during the lifetime of the board
Data Processing
Security Features on Standard x86 Based Boards
Type Win7 (x32/x64) Legacy
Win7 (x32)
UEFI
Win7 (x64)
UEFI
Win8 .x (x32/x64)
Legacy
Win8 .x (x32/x64)
UEFI
Win10 (x32/x64)
Legacy
Win10 (x32/x64)
UEFI
TPM 2.0 Support No No Yes1 No Yes No Yes
1) MS Hotfix required: Update to add support for TPM 2.0 in Windows 7 and Windows Server 2008: https://support.microsoft.com/en-us/kb/2920188
62 63| |
Advantech attach great importance to deliver the highest level of threat visibility
& protection for their customers – we are not alone
Embedded security solutions from Advantech and those partners, world leading companies like McAfee, Acronics and SUSI help manu-
facturers to ensure their products and devices are protected from cyberthreats and attacks. Embedded systems and device security
solutions span a range of technologies, including application whitelisting, antivirus and anti-malware protection, device management, and
encryption. Solutions can be tailored to meet the specific design requirements for a manufacturer’s embedded device and its architectures.
One additional important advantage of our
Embedded Systems products:
■ Panel PC's
■ Touch Panel PC's
■ Box PC's
■ Fanless Box PC's
■ Tablet PC's
This is the all-around secure package about security of our
hardware which was mentioned before.
The software for our "Bulletproof " secure shield from outside is
reloaded with Acronis, McAfee and SUSI 4.0, highest provided
security software on planet.
WISE-PaaS/Security – Embedded System
Advantech create WISE-PaaS Software solution for customers
with various IoT software services and solution packages.
Data Processing
Secure Software Solution from Advantech, Acronis, McAfee Acronis True Image 2017 – The No .1 Personal Backup Software
Acronis True Image 2017 is an integrated software suite that ensures the security of all of the information on your PC. It can back up
your documents, photos, e-mail, and selected partitions, and even the entire disk drive, including operating system, applications, settings,
and all of your data.
■ Back up everything in just two clicks ■ Get the fastest backup and recovery available ■ Protect mobile, social and remote data
Easy Image Backup
Protect everything easily: operating system, programs, settings,
files, and boot information.
Simple Two-click Backup
Back up to external drives, network shares, and cloud with just
two clicks.
Dual-Protection™
Back up locally to your external drives, network shares, and store
copies in the Acronis Cloud.
Mobile Backup
Back up all your phones and tablets to your Windows PC and/or
to Acronis Cloud. Manage all devices from touch friendly online
dashboard. Migrate your data from Android to iOS and back.
Better than native backup!
Remote Backup
Back up remote computers easily and safely.
Social Backup
Protect Facebook photos and posts with automatic, incremental
social backup.
More than just Backup – Use powerful
features and tools above and beyond backup
■ Clone disks and create exact replicas of your system disk to
faster or larger storage devices
■ Migrate your system to a new computer with Acronis
Universal Restore
■ Archive files from your computer to cloud storage or an
external drive to free up disk space
■ Find selected files within backups and archives with powerful
search
■ Synchronise files between multiple computers and access the
most important data any time
■ Safely try new software and drivers and roll back to a previous
configuration with Try & Decide
■ Securely delete temporary files, purge recycle bin, and free disk
space with system cleanup
New Features
■ Ransomware protection
■ Proving file authenticity with Blockchain technology
■ Mobile backup encryption
■ Browsing content of local mobile backups
■ Separate activation of Acronis Cloud
■ Encryption of a Facebook backup
Cloud Features
Get the following benefits when your purchase includes Acronis
Cloud Storage:
■ Back up files, folders, and full disk images to the Acronis Cloud
■ Archive files to the cloud
■ Search backup files in the cloud
■ Back up mobile devices to the cloud
■ Synchronise files to the cloud and between computers
■ Gain additional protection with the 3-2-1 rule: Have 3 copies of
your data; on 2 different types of storage; 1 being in the cloud
■ Implement additional ransomware protection by having a copy
in a location not reachable by a virus on your local computer
The Original Full Image Backup
■ 14 years & more than 5.5 million users worldwide!
■ Backup up everything with one solution.
Acronis is faster than all competitors with backup technology
to local drives. Cloud archives, backups, and synchronisation
take advantage of your entire broadband capability.
■ Full image backup
■ Multi-platform backup to PC and cloud
■ Modern disk drive and NAS device support
■ Full computer recovery to dissimilar hardware
■ Remote backup plans
■ Cloud and local archive
■ File synchronisation
... and much more!
This integrates:
■ Backup Recovery
■ Application Control
■ Endpoint Security 10
■ Integrity Control
into their ‘Cloud’ based WISE-PaaS.
Acronis and McAfee embedded solutions provide superior and
intelligent security functions, for protecting IoT devices and
data from
■ Zero-day attacks
■ Monitoring/tracking system changes
■ Guarding entire systems
64 65| |
McAfee Deliver the Solution
McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates
business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products,
McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats
happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle. By
working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.
Advantech Complete Bundle Solution for Security of Embedded Sytems – SUSI
SUSI – A Bridge to Simplify & Enhance H/W & Application Implementation Efficiency.
When developers try to write an application that involves hardware entry, they have to study the specifications to write the drivers. This
is a time-consuming job and requires lots of expertise. Advantech has done all the hard work for customers with creation of a suite of
Software APIs (Application Programming Interfaces), which is called Secured & Unified Smart Interface (SUSI). SUSI provides not only
the underlying drivers required but also a rich set of user-friendly, intelligent and integrated interfaces, which speeds up development,
enhances security and offers add-on value for Advantech platforms.
Data Processing
Secure Software Solution
McAfee Whitelisting Technology
McAfee Embedded Security Solution is ideal for protecting systems that are fixed-function in terms of CPU or memory resources. Embed-
ded security solutions from McAfee help manufacturers ensure their products and devices are protected from cyberthreats and attacks.
Secured & Unified Smart Interface (SUSI) – Faster Time to Market
Features
■ Low overhead because dynamic whitelisting eliminates
manual effort
■ Low impact on system performance
■ Low CPU and memory requirements
■ Low ownership costs result from no-need-to-manage as
long as devices are operating well
Key Features 1: Application Control
■ Protects against zero-day-attacks
■ Only authorized software is allowed to run
■ Prevents all unauthorized applications from being executed
■ Makes sure the machine does what it should do
■ Automatically accepts new software added through
authorized process
Key Feature 2: Change Control
■ Sets access rights for who or which application can access
protected data
■ Prevents outages resulting from unplanned changes
Key Feature 3: ePolicy Orchestrator
■ Fast time to remote deployment/configuration
■ Reporting
■ Central management
■ Compliance requirements
■ Monitors data of managed clients
Remote Monitoring
You can fully monitor remote devices,
like CPU temperatures, fan speeds and
hard disks.
Remote On/Off
The Remote On/Off tools let you
power on, or power off all or indi-
vidual devices within a group. It also
allows the user to setup scheduled tim-
ings with alerts and warnings.
Remote KVM
You can directly control remote desktops
through the Remote KVM tool to carefully
manage all aspects of their resources.
System Recovery
The System Recovery can let you protect
data and devices with backup and disas-
ter recovery. It is powered by Acronis
True Image to enable the fast and reliable
backup & restore
The System Protection can let you ensure
all remote devices are protected from
caber threats and attacks. It is powered by
McAfee Embedded Security solutions to
enable the best security in the world.
Benefits
■ SUSI's unified API helps developers write
applications to control the hardware without
knowing the hardware specs of the chipsets
and driver architecture.
■ Reduced Project Effort
When customers have their own devices con-
nected to the onboard bus, they can either:
study the data sheet and write the driver &
API from scratch, or they can use SUSI to
start the integration with a 50% head start.
Developers can reference the sample pro-
gram on the CD to see and learn more about
the software development environment.
■ Enhances Hardware Platform Reliability
SUSI provides a trusted custom ready soluti-
on which combines chipset and library func-
tion support, controlling application deve-
lopment through SUSI enhances reliability
and brings peace of mind.
■ Flexible Upgrade Possibilities
SUSI supports an easy upgrade solution for
customers. Customers just need to install
the new version SUSI that supports the new
functions.
■ Backward compatibility
Support SUSI 3.0, iManager 2.0 and EAPI 1.0
interface. Customers don’t need to change
any APIs in their applications.
System Protection
66 67| |
FSP
The GDPR is pushing a manufacturer to build robust systems. The basis for a system is always the power supply. Having a robust power
supply can be addressed by a redundant strategy against failure of a power supply or a battery buffered power supply against failure of
the power input itself. A robust power supply will help to avoid data corruption.
Data Processing
Secure Power Supply
Redundant Power Supplies
Redundant Power Supplies for seamless switching between two or three independent Power Supplies in case of defect on one Power
Supply is very important to safe data in networking servers and cloud systems.
Uninterruptible Power Supplies
Uninterruptible Power Supplies are mandatory for systems where failures are not acceptable. They provide uninterrupted power in
case of power failure and ensure the voltage quality. There are different types of UPSs.
Type Series
1U
FSP250-60RGBHA, FSP300-60RGBHA, FSP600-RHHS
YH5151-1EAR, YH5301-1EAR, YH5451-1GAR, YH8651-1EAR
2U
FSP550-50ERS, FSP600-50ERS, FSP700-50ERS, FSP800-50ERS
YH5301-1CAR, YH6621-1BBR, YH5681-1HAR, YH5821-1CAR
3U YH7761-2AGR, YH5132-2AA03R
PS2 FSP400-70RGHBB1, FSP500-70RGHBB1, FSP600-70RGHBB1, FSP700-70RGHBB1,
Mini FSP350-80EVMR, FSP500-80EVMR, FSP350-50MRA(S), FSP500-50MRA(S) YH8511-1AAR, YH8611-1AAR, YH5651-1TA02R, YH5751-1EA04R
DC/DC YH8511-1AAR, YH8611-1AAR, YH5651-1TA02R, YH5751-1EA04R
Features
■ Alert-LED identifies the defect Power Supply
■ Monitoring the power supplies via software tools
and PMBus functionality
■ Typically less than 18ms Hold-Up-Time
■ Hot swappable for replacement and maintenance
■ Highest efficiency and reliability due to selected
components
Features
■ Off-Line UPSs
Starts to feed the system typically 2-10 ms after power failure
■ On-Line UPSs
draw power through the power conditioning and charging
components continuously
■ Line-Interactive UPSs
are a mixture between Off- and On-Line, they start after
power failure but the main power is always conditioned by
the inverter and the battery charger is connected continuously
■ AVR UPSs provide an automatic voltage regulation for
constant voltage and power line
conditioning combined with
a battery
■ Highest efficiency and reliability
due to selected components
Feature Technical Data
Off-Line
Champ RM 1k/2k/3k/6k/10k
Mplus 30 – 300 kVA
Proline (3P-3P) 10 – 30 kVA
On-Line NANO 400/600/800
Line-Interactive
FP600/800/1000/1500/2000
CP750/1000/1500/2000
EP450/650/850/1000/1500/2000
AVR SCUDO600/1000/1200
Phase Single w/ground or 3 phase
Capacity 1KVA / 900 W
Input 110 – 280 Vac / 46~70 Hz
Output 200-240 Vac / 47~63 Hz
Efficiency 83 % – 93 %
Battery 12/9 Ah
Indicators Load level, Battery level, Line mode, Battery mode, Bypass mode, Fault indicators
Alarms Battery mode, Low Battery, Overload, Fault
Dimensions D x W x H (mm)
Management Windows 2000 to Windows 10, Mac, Linux and Power Mgmt. from SNMP and Web browser
68 69| |
Integrated Data Security Features
Within the IoT and in Industry 4.0 and robotics, standard micro-
controllers for industrial and consumer applications are usually
used (general purpose microcontrollers). Models with integrated
security features are already available in this field. Our Linecard
possesses a variety of features that offer protection as regards
■ Identity theft (anti-tampering mechanisms, integrity checks,
traceability)
■ Throttling of data services
■ Data and code interception and tampering (memory protection,
rights management, debug levels, anti-tampering mechanisms,
integrity checks, secure firmware updates)
■ Physical or mechanical attacks (anti-tampering mechanism on
module)
These features are mainly integrated into the chip and ensure
robust authentication, integrity of the platform and consistent data
security, thereby ensuring the privacy of the end user and provid-
ing comprehensive protection of data, IP and trademarks – thereby
also satisfying the highest standards when it comes to data security
in standard products. Typical target applications include printers,
computers, gateways, IoT end nodes and sensors.
The Defenses of the Standard Microcontroller
In the midst of the rise of IoT, Industry 4.0 and robotics, microcontrollers are increasingly becoming a protective shield from tampering
and cyber-attacks. Various microcontroller families are already equipped with an arsenal of security features. Once the European General
Data Protection Regulation (GDPR) enters into legal force in May 2018, businesses must have implemented the data security standards
specified therein. The law regulates the pseudonymization and encryption of personal data much more stringently, with new resilience
and accountability provisions compared to the previous legal basis in Germany.
The GDPR affects not only manufacturers but also operating enterprises such as OEMs and network operators. As a central control and
regulatory component, microcontrollers have a key role to play in networked systems. Manufacturers are already working with develop-
ment processes that are certified in accordance with corresponding security standards. With a secured production chain, semiconductor
manufacturers also offer their customers secure end-to-end solutions. STMicroelectronics was recently the first microelectronics com-
ponent manufacturer to receive the “France Cybersecurity Label” for microcontroller solutions that combine maximum security and
flexibility for a variety of target markets.
Hardware-Based Functions
Integrity & Safety
The cyclic redundancy check determines a check value that enables
errors in data transmission or storage to be detected. This means
that it is not only possible to check the integrity of the data but also
verify the signature of the software while it is running.
The secured power supply monitoring system (POR [Power on
RESET] / PDR [Power down RESET] / BOR [Brown out RESET]
/ PVD [Programmable Voltage Detector] flag status) enables the
reason for a reset to be identified and ensures that it has been con-
ducted on the basis of legitimate access. It is supplemented by the
“read while writing” function for efficient tampering detection and
logging.
The Clock Security System (CSS) is based on the clock and the system
upon restoration, as well as internal and external clocks functioning
independently of one another. The Watchdog and Window Watch-
dog also monitor the time windows independently of one another.
The integrity and trustworthiness of the memory contents are
ensured using Error Correction Code (ECC) and parity checking.
It also offers expanded protection from attacks aimed at sneaking
in errors. A temperature sensor continuously monitors the ambient
temperature of the IC to prevent it from deliberately being heated
above its specified range, permanently damaging it.
Encryption Methods
Encryption methods protect a source text from unauthorized
access by encrypting the original plaintext using a code. Breaking
the code enables the hacker to decode the encrypted text. More
sophisticated cryptographic methods use symmetric or asymmetric
encryption. With symmetric encryption, there is only one key with
encryption and decryption, meaning that the sender and receiver
use the same key.
With asymmetric methods, each of the communication partners
uses their own key, which is used to generate a key pair. This con-
sists of a public key, which is used to encrypt the data, and a private
key, which decrypt it.
For example: Symmetric method – Certain STM32 series have
a genuine random number generator, used to generate 32 bit
keys for encryption, integrated entirely into the chip.
Security Takes on Different Meanings for
Each Application
In security terms, the target applications can be broken down into
different microcontroller categories:
■ Authentication solutions and TPMs (Trusted Platform
Modules), e.g. for trademark protection and IoT networks
■ Banking and ID solutions for traditional smartcard enterprises
in the fields of payment, personal identification, transportation
and paid TV content
■ Mobile security solutions for SIM-based solutions in mobile
products and machine-to-machine (M2M) applications
■ Automotive solutions for near-field communication (NFC, eSE)
and safe driving
Data Processing
Microcontroller
70 71| |
Security in General Purpose Microcontrollers
During data transfer, the firewall isolates the code or data compo-
nent of the flash memory or SRAM from the remainder of the code
executed outside of the protected area. The firewall is more restric-
tive than the memory protection unit (MPU) and is only integrated
into the STM32L0, L4 and Renesas Synergy S5 & S7.
Memory Protection
Read protection is used to manage how memory is accessed. Mem-
ory dumps and backups of user IPs for instance are not permit-
ted. Write protection enables each sector to be protected from
unwanted write operations. Proprietary code protection allows
each memory region to be configured as “execute only”, meaning
that only code may be executed here – it is not possible to write to
this region.
IPs and confidential data can be securely deleted using the mass
erase or secure erase functions. This function resets the memory
entirely to its factory state.
Traceability of Data
Many microcontroller series have a specific, unique 96 bit ID to
ensure that an end product is traceable. This can also be used for
the diversification of security keys.
Many series also have functions enabling a secure firmware update.
Software-Based Encryption Methods
The security functions implemented in hardware can also be sup-
plemented with software-based solutions. Cryptographic library
packages are available for different microcontroller families with a
range of cryptographic algorithms. They are provided as standard
in binary object format, and can also be provided in source code
form under the terms of an NDA-based license. A hardware expan-
sion is also available to provide certain groups of integrated circuits
with functional support.
In addition to the random number generator integrated into the
chip, a software package provides protection from replay attacks,
which use prior requests for a renewed attack.
A hash algorithm verifies digital signatures and authentication
codes of messages in order to ensure that the data is trustworthy
and to protect its integrity. There are also software packages avail-
able with symmetric and asymmetric encryption methods.
For sophisticated IoT solutions, there is also the option of
utilizing another on-board module – the STSAFE-A100 from
STMicroelectronics or the OPTIGA family from Infineon are
supplied as a ready-to-run solution with a secure operating sys-
tem. This latest generation of secure microcontrollers enhances
authentication and data management service security for local and
remote host PCs, smart home, smart city and industrial applica-
tions, electronic entertainment devices and all kinds of other end
devices, utilities and accessories.
Grafik
oder Bi
ld benö
tigt
Hardware-Based Functions
...Encryption Methods
The encryption is based on the symmetric Advanced Encryption
Standard (AES), whereas STM32F2, F4, F7, L4 series employ-
ing a key length of 128 bits (AES-128) and 256 bit (AES -256)
with a variety of methods (ECB, CBC, CTR,GCM, GMAC,
CMAC), while STM32L0 / L1 employing a key length of 128 bits
(AES-128). Such symmetric encryption standard is also available
within dedictated MCU/MPU-families of few other suppliers (e.g.
Renesas RX, Renesas Synergy and Toshiba TZ1000) (see cross list).
Additionally, Renesas RX-family and Synergy S5 & S7 series offer
asymmetric encryption engine in hardware, an outstanding feature.
The advantage of the symmetric method is that, because there is
only one key, key management is simpler than with asymmetric
methods. Encryption and decryption is also significantly faster.
Some microcontroller parts also have fully integrated hash
functions, where data is hashed and scattered, and the function
maps a larger amount of input to a smaller amount of target data.
There is also the keyed-hash message authentication code (HMAC).
The structure of this message authentication code (MAC) is based
on a cryptographic hash function. HMACs are specified in RFC
(Request for Comments) 2104 and in the NIST (National Institute
of Standards and Technology) standard FIPS 198.
Anti-Tamper Mechanism
The anti-tamper mechanism is used to defend against deliberately
or unintentionally launched physical attacks against the hardware
system outside of the microcontroller. The backup domain, which
references various wake-up sources, ensures that protection is main-
tained even in low-power mode. The real-time clock (RTC) time-
stamps each tamper event.
Some microcontroller series also have RTC register protection,
which blocks unauthorized write operations and operates indepen-
dently of the system reset, but does not include protection when
writing a sequence of keypresses.
If tampering is detected, the backup register ensures that the writ-
ten content is automatically deleted. The communication channels
can also be selectively blocked with a GPIO communication block.
This prevents selected general purpose inputs/outputs (GPIO), and
the block can be removed upon next reset.
Debug Block
The debug block prevents unauthorized access to the microcontroller
via a debug interface. The security level can be selected for each appli-
cation or requirement, although it cannot be downgraded again after
that point.
Access Rights Management
Access rights confer upon users or user groups the authority to per-
form certain actions. To this end, the integrated memory protection
unit (MPU) divides the memory into regions with different access
rights and rules.
Data Processing
Microcontroller
72 73| |
Security Features Built in General Purpose MCUs – Industrial & Consumer Purpose
The cross list for security features refers to MCU families whereas each subline within MCU family contains at least ONE part number with listed security features.
The portfolio listed is usually silicon based / hardware integrated. Exception: the SW based methodes of encryption and the Crypto (SW) feature
Data Processing
Microcontroller
Supplier STMicroelectronics Infineon Renesas Toshiba EPSON
Family Proprietary CortexM0+ CortexM0 CortexM3 CortexM3 CortexM3 CortexM4 CortexM4 CortexM4 CortexM7 CortexM0 CortexM4 Proprietary Cortex A Cortex M0+ Cortex M4 Cortex M Cortex M4 Cortex M4 Propriatary CortexM0+
Series STM8L STM8S STM32L0 STM32F0 STM32L1 STM32F1 STM32F2 STM32F3 STM32L4 STM32F4 STM32F7 XMC1x XMC4x RL78 RX RZ Synergy S1 Synergy S3 Synergy S5 & S7 TZ1xxx TXZ S1C17 S1C31
Integrity &
Safety
CRC Calculation Unit X X X X X X X X X X X X X X X X X X – –
Power Supply Integrity Monitoring X X X X X X X X X X X X X X X X X X X X X
Read While Write X X X (X) X (X) (X) X X X X – –
Clock Security System (CSS) X X X X X X X X X X X X X X X X X X X X X
Error Correction Code (ECC) X X X X X X X X X X X X X X X X X – –
Parity Check X X (X) X X X X X X X X X X X
Temperature Sensor X X X X X X X X X X X X X X X X X X X
Watchdogs X X X X X X X X X X X X X X X X X X X X X X
Crypto HW
Random Number Generator X X X X X X X X X X X X X
Hashing Functions & HMAC X (X) X x X X X X
Symmetric Cryptography (X) X X X X X X X X X X X
Asymmetric Cryptography X X
Asymmetric Key Generations
Accerlator X X X – –
Crypto
Software
Package
Random Number Generator X X X X X X X X X X X X X X X X X – –
Hashing Functions & HMAC X X X X X X X X X X X X X X X X X – –
Symmetric Cryptography X X X X X X X X X X X X X X X X X – –
Asymmetric Cryptography X X X X X X X X X X X X X X X X X – –
Tamper
Protection
Anti Tamper X X X X X X X X X X X X X X X X – –
Backup Domain X X X X X X X X X X X X X X X X – –
RTC (Alarm Timestamp) X X X X X X X X X X X X X X X X X X – –
RTC Register Protection X X X X X X X X X X X X X X X X X
Backup Registers X X X X X X X X X X X X X X X – –
GPIO Configuration Locking X X X X X X X X X X X X X X X X
Debug Lock
Level
JTAG or SWD X X X X (X) X X X X X X X X X X X X X X X X X
Permission
Management
Memory Protection Unit (MPU) X X (X) X X X X X X X X X X X X – –
Firewall X X x x x – –
Memory
Protection
Read Protection (RDP) X X X X X X X X X X X X X X X X X X X X
Write Protection (WRP) X X X X X X X X X X X X X X X X X X X X X
Proprietary Code Protection X (X) X (X) X X X X X X X X X X X
Mass Erase X X X (X) X X X X X X X X
Traceability Device 96 Bit-Unique ID X X X X X X X X X X X X X* X X X X X – –
Secure
Update
Software FSU X X X X X X x X X
(X) X* –STM32: SECURITY feature not available at each sub-Line of mentioned MCU family Renesas RL78: Device Electronic 64 bit Unique ID only Epson: Even NOT available currently, could be included in new products tbd.
74 75| |
Security Features in General Purpose MCUs of STM32 Family
Integrity & Safety 1/2
Data Processing
Microcontroller
Features Benefit STM32 Family
CRC calculation unit
Used to verify data transmission or storage integrity
L0,L1,L4
Computes a signature of the software during runtime
Power Supply Integrity Monitoring
Ultra safe supply monitoring (POR/PDR/BOR/PVD) F0,F1,F2,F3,F4,F7,
L0,L1,L4Flag status to determine what causes reset (SW, watchdog, power up, low power, option bytes, ...)
Read While Write For efficient tamper detection logging F1,F4,L0,L1,L4
Clock Security System (CSS) Independent clock sources and Clock recovery systems F0,F1,F2,F3,F4,F7,L0,L1,L4
Error Correction Code (ECC)
Robust memory integrity
F1,F2,F3,F4,F7,L0,L1,L4
Hardened protection against fault injection attacks thanks to error detection
Parity check
Memory content integrity check
F0,F3,L4
Hardened protection against fault injection attacks
Temperature Sensor Check if device is operating in expected temperature range. Hardened protection against tempera-ture attacks. (AN3964)
F0,F1,F2,F3,F4,F7,
L0,L1,L4
Watchdogs
Independent watchdog and window watchdog for software timing control
L0,L1,L4
Key registers to control watchdogs
Crypto – Hardware
Features Benefit STM32 Family
Random Number Generator (RNG) True RNG is done entirely by the hardware. It delivers 32 bit random numbers F2,F4,L0,L4,F7
Hashing Functions
& HMAC MD5, SHA-1, SHA-2 F2,F4,F7
Symmetric Cryptography
AES-128 Bits (ECB, CBC,CTR) F2,F4,F7,
L0,L1 AES-128/265 Bits (ECB, CBC, CTR, GCM, GMAC, CMAC) (only L4)
Crypto – Software
Features Benefit STM32 Family
Random Number Generator (RNG) On chip entropy generation. Ensure strong keys, protect against replay attacks. (UM0586)
Based on DRBG-AES-128;
F0,F1,F2,F3,F4,F7,L0,L1,L4
Hashing Functions & HMAC Hash algorithm provides a way to guarantee the integrity of information, verify digital signatures and message authentication codes. MD5, SHA-1, SHA-224, SHA-256. (UM0586) F0,F1,F2,F3,F4,F7,L0,L1,L4
Symmetric Cryptography
STM32 cryptographic library package: (UM0586)
■ DES/TDES: ECB,CBC
■ AES: ECB, CBC, CTR, CCM, CBC-MAC, GCM, CMAC, KEYWRAP
F0,F1,F2,F3,F4,F7,L0,L1,L4
Asymmetric Cryptography
RSA signature function with PKCS#1v1.5
F0,F1,F2,F3,F4,F7,L0,L1,L4
ECC (Elliptic Curve Cryptography): Key generation, Scalar multiplication, ECDSA. (UM0586)
Tamper Protection 1/2
Features Benefit STM32 Family
Anti Tamper
Protect against a wide range of physical attacks on HW system outside the MCU F0,F1,F2,F3,F4,F7,
L0,L1,L4(AN3371)
Backup Domain
Maintains tamper protection active even in Low Power modes
F0,F1,F2,F3,F4,F7,
L0,L1,L4Multiple wake up sources.
(AN3371)
RTC (Alarm Timestamp)
Timestamp on tamper event F0,F2,F3,F4,F7,
L0,L1,L4(AN3371)
RTC Register Protection Write protection. Unprotecting by writing a key sequence Independent from system reset
F2,F3,F4,F7,
L0,L1,L4
Backup Registers
For confidential data storage (Keys …) Backup register and SRAM
Tamper automatically deletes registers content See product datasheets
(AN3371)
GPIO Configuration Locking
Lockofselected GPIO. Impossible to unlock until next reset F0,F1,F2,F3,F4,F7,
L0,L1,L4Capability to lock communication channels after tamper detection
Debug Lock level 0,1,2
Features Benefit STM32 Family
JTAG or SWD
Prevent unauthorized access to the device through debug interfaces F0,F1*,F2,F3,F4,F7,L0,L1,L4
Highest security level is irreversible
(AN4246)
Privileges Permission Management
Features Benefit STM32 Family
Memory Protection Unit (MPU) The processor MPU is a component for memory protection. It divides the memory map into a number of regions with privilege permissions and access rules F1*,F2,F3,F4,F7,L0,L1,L4
Firewall
Even more restrictive than MPU. Made to protect a specific part of code or data Flash Memory,
and/or to protect data into the SRAM from the rest of the code executed outside the protected
area L0, L4
(AN4632)
Memory Protection
Features Benefit STM32 Family
Read Protection (RDP) Global memory access control management. Prevents memory dumps, safeguarding user’s IPs (AN4246)
F0,F2,F3,F4,F7,
L0,L1,L4+SRAM
Write Protection (WRP)
Each sectors can be protected against unwanted write operations F0,F1,F2,F3,F4,F7, L0,L1,L4+SRAM
(AN4246), AN4701(F4), AN4758(L4)*
Proprietary Code Protection (PCROP) Each Sector can be configured in “execute only”. AN4246(L1), AN4701(F4), AN4758(L4)* F4,L0,L1*,L4
Mass Erase Safely remove IPs and confidential data. Forcefactory reset F7,L0,L1,L4
*Security feature not available at each sub-Line of mentioned MCU family
Traceability
Features Benefit STM32 Family
Device Electronic 96 Bit Unique ID
Enables product traceability F0,F1,F2,F3,F4,F7,
L0,L1,L4Can be used for security key diversification
Secure Firmware Update
Features Benefit STM32 Family
Software FSU
Secure firmware upgrade capability F2,F4,
L0,L4,F7 (AN4023 & AN4024)
76 77| |
Security of Automotive MCUs – EVITA and SHE Security Features
EVITA and SHE are major security initiatives in the automotive world which define security standards. In order to harden ECUs against
security attacks, the security mechanisms should prevent successful manipulation of SW, data, keys and keying material – so they must
be rooted in hardware. The Secure Hardware Extension (SHE) specification known as an Automotive initiative of the HIS working
before 2010 has meanwhile been accepted as an open and free standard. The SHE specification defines a portfolio of functions and a pro-
grammer’s model (API) enabling a secure zone to coexist within any electronic control unit installed in the vehicle. The most significant
features inside a secure zone are storage and management of security keys, plus encapsulating authentication, encryption and decryption
algorithms that application code can access through the API. These features help maximize flexibility and minimize costs.
. . .The Hardware Security Modules (HSM)
Light EVITA HSM
Focus is a secure interaction of secured ECUs with sensors / actua-
tors. The only requirement – it contains a symmetric cryptographic
engine and a corresponding hardware interface, which enables to
fulfill strict cost and efficiency requirements for sensors / actuators
applications (e.g. regarding message size, timings, protocol limita-
Automotive SECURITY Level Classification
tions or processor consumption). Shared secrets are handled in a
different way i.e. by means of pre-configuration during manufac-
turing, by self-initialization, which is based on physically unclon-
able functions, or based on running a key establishment protocol
in software at the attached application processor. [2]
EVITA –
E-Safety Vehicle Intrusion Protected Applications
The project EVITA, which is coordinated by the Fraunhofer SIT
has the aim of the provision of a cost-effective hardware security
architecture fulfilling the requirements of present on-board secu-
rity issues. The following general categories are considered to be
protected:
■ Vehicle-to-X (V2X) communication
■ On-board communication between actors, sensors and
electronic control unit (ECU)
■ Integration of mobile devices
■ Diagnosis processes
■ Vehicle safety applications
■ Drivers privacy
Therefore, security methods have to be implemented in hardware
like hashing routines, authentication protocols and encryption
algorithm. Furthermore, the ECUs have to be protected against
tamper, unauthorized cloning and thievery. EVITA is an open spec-
ification to offer the benefits to the whole automotive industry. In
the given EVITA specification TPM and SHE are already covered.
[1][3]
The Hardware Security Modules
(HSM)
The Hardware security module (HSM) components are splitted
into mandatory / optional components. Depending on the use
cases, different security requirements must be considered. For
cost-effective HW-solutions, three different EVITA HSM variants
are specified with different security level.
Full EVITA HSM
Provides the maximum level of functionality, security and perfor-
mance of HSM variants. Focus on protecting in-vehicle domain
against security vulnerabilities of V2X communications. Therefore
electronic signatures must be created / verified. A very efficient
asymmetric cryptographic engine is needed in order to meet the
specified security performance. Suited for a maximum of security
life time.
Medium EVITA HSM
Focus on securing on-board communication with the ability to per-
form several non-time-critical asymmetric cryptographic opera-
tions in SW, e.g. in order to establish shared secrets. All internal
communication protection is based on symmetric cryptographic
algorithms. Compared to the full version it comes without the inte-
grated asymmetric cryptographic building block and allows only a
reduced CPU performance (e.g. 25 MHz vs. 100 MHz).
Data Processing
Microcontroller
Type SHE EVITA Light EVITA Medium EVITA Full
Internal Clock w/ incl. external UTC synchron. X X X
Internal NVM (Non Volatile Memory) X X (optional) X X
Counter (16 x 64 bit) X X
Tamper Protection (HW) X X X X
Parallel Access- Multiple sessions X X X
CPU internal
…CPU programmable X X
…CPU PRESET X (option)
Boot Integrity Protection:
Authentication & Secure Secure only X (optional) X X
Random Number Generator
…. based on PRNG w/ TRNG seed X PRNG w/ external seed X X
Crypto algorithm, incl . key generation (HW)
AES /MAC X X X X
Options: ECDSA, ECDH, WHIRLPOOL / HMAC X X
Crypto acceleration (HW)
AES X X X X
ECC, WHIRLPOOL X
Components for different EVITA HSM`s, suggested in publications
Security requirements and related functional requirements considered for EVITA
■ Integrity / authenticity of e-safety related data:
in terms of origin, content, and time. Forgery of such informa-
tion, tampering, or replay of this information should be at least
detectable
■ Integrity / authenticity of ECU / firmware installation /
configuration: Any replacement / addition of an ECU, also
with related firmware or configuration to the vehicle must be
authentic in terms of origin, content, and time
■ Secure execution environment:
Limited consequences requested on separate / more trusted
zones of the platform, in case of a successful ECU attack
■ Vehicular access control:
Control requested in regard to the access of vehicular data and
functions
■ Trusted on-board platform:
Integrity / authenticity of operated software has to be ensured
■ Secure in-vehicle data storage:
in regard to ensure access control and integrity, freshness and
confidentiality of data stored within a vehicle
■ Confidentiality of certain on-board or external communication: in
regard to confidentiality of existing software / firmware, updates
and security credentials which must be ensured
■ Privacy data:
for personal data stored within a vehicle, contained in messages
sent from vehicle to the outside
■ Interference of security functionality:
availability of bus systems, CPUs, RAM and wireless
communication technologies must be ensured [2]
Source:
[1] EVITA E-Safety Vehicle Intrusion Protected Applications.
URL: https://www.evita-project.org/EVITA_factsheet.pdf. visited:
24.08.17
[2] F2010-E-035 SECURE AUTOMOTIVE ON-BOARD
ELECTRONICS NETWORK ARCHITECTURE
URL: https://www.evita-project.org/Publications/AEHR10.pdf.
visited: 24.08.17
[3] Securing Vehicular On-Board IT Systems: The EVITA Project.
URL: https://www.evita-project.org/Publications/HRSW09.pdf.
visited: 24.08.17
78 79| |
EVITA and SHE Security Features – Automotive
The Automotive HSM
The HSM Block consists of HW embedded mandatory functional blocks:
Secure Storage
HW embedded Internal RAM and
Internal NVM PFlash/DFlash
Crypto HW Acceleration
basically with HW embedded Symmetric Crypto Engine.
Further blocks are available as option:
■ Symmetric Crypto Engine
■ Asymmetric crypto engine (optional)
■ TRNG/PRNG (optional)
■ Hash Engine (optional)
■ Counters (optional)
Overview Security Features
Aurix 1./2. Generation – TC2xx / TC3xx Series
Data Processing
Microcontroller
Committed to excellence September 18, 2017 | p. 1
Application Core
„Shared area“
Ram
(data Exchange)
Application NVM
Pflash / DFlash
Application
CPU Core
Bus Interface
(e.g. Can IF)
Internal Ram
Internal NVM
Pflash / DFlash
HSM
Secure Storage
Crypto HW
Acceleration
Secure
CPU Core
HW Interface
Asym crypto
Engine
Sym crypto
Engine
Counters
TRNG/PRNG
Hash Engine
data
interrupt
In-vehicle Bus System
Application Core
The Application Core consists of a Application CPU and Bus Interface, e.g. a CAN Interface, as well as Shared area RAM for data
exchange and/or an Application NVM (PFlash/DFlash).
Interrupts are exchanged between HSM block (HW interface) and the Application Core (Application CPU Core).
Data are exchanged between HSM block (HW interface) and the Application Core (“Shared area RAM”).
Source: https://www.evita-project.org/Publications/AEHR10.pdf
Secure CPU Core
CPU architecture and specific HW embedded features dedicated
for highest possible security. It incorporates a Tamper – resistant
processor and several security features based on dedicated hard-
ware implementation. It is optimized for Security applications,
known primarily from tamper-resistant smart cards, also suited
for usage of advanced payment systems, electronic passwords and
others. It is now migrating into an area of transporting, vehicle etc.
HW-Interface
enables data exchange and interrupt request exchange with
application core. Series TC2xx TC3xx
EVITA medium full
HSM X X
HSM Block X X
Cryptographic Coprocessor (HSM) X X
Secure System Configuration X X
Secure Boot X (SHE +SW) X (SW 3rd party)
Flash Memory Protection X X
External Access Protection X X
Device Life Cycle X* X*
ROM keys on request on request
Test Life Cycle on request on request
Sealing on request on request
CAN / FlexRay Clock Jitter Disable on request on request
Reset Password on request on request
eFuse on request on request
X
X*
on request
Feature available
Depends on configuration
NDA requested
EVITA Medium – Aurix TC2xx Series
Type SAx-TC21x SAx-TC22x SAx-TC23x SAx-TC26x SAx-TC27x SAx-TC29x
Series 1x Series 2x Series 3x Series 6x Series 7x Series 9x Series
Safety: SIL Level ASIL-D ASIL-D ASIL-D ASIL-D ASIL-D ASIL-D
Security: HSM X (optional) X (optional) X
Type SAx-TC32x SAx-TC33x SAx-TC33x SAx-TC35x SAx-TC36x SAx-TC37x SAx-TC38x SAx-TC39x
Series 2x Series (1 MB)
3x Series
(2 MB)
3x Series +eXtens
(2 MB)
5x Series
(4 MB)
6x Series
(4 MB)
7x Series
(6 MB)
8x Series
(10 MB)
9x Series + eXtens
(16 MB)
Safety: SIL Level ASIL-D ASIL-D ASIL-D ASIL-D ASIL-D ASIL-D ASIL-D ASIL-D
Security: HSM+ECC256 X X X X X X X X
EVITA Full – AURIX TC3xx Series
80 81| |
STM8Ax Series Aurix 1./2. Generation – TC2xx / TC3xx Series
SECURITY Features integrated in MCUs STM8AF STM8AL
Integrity & Safety
CRC calculation unit
PowerSupply integrity monitoring X X
Read While Write X X
Clock Security System (CSS) X X
Error Correction Code (ECC) X X
Parity check
Temperature Sensor X X
Watchdogs X X
Crypto HW
Random Number Generator (RNG)
Hashing Functions & HMAC
Symmetric Cryptography
Cryptro SW
Random Number Generator (RNG)
Hashing Functions & HMAC
Symmetric Cryptography
Asymmetric Cryptography
Tamper Protection
Anti Tamper X X
Backup Domain
RTC (alarm timestamp) X X
RTC Register protection X X
Backup registers X X
GPIO configuration locking
Debug Lock Level JTAG or SWD X X
Privileges Permis-
sion Management
Memory Protection Unit (MPU)
Firewall
Memory Protection
Read Protection (RDP) X X
Write protection (WRP) X X
Proprietary Code Protection (PCROP)
Mass Erase
Traceability Device electronic 96 bit Unique ID X X
Secure Firmware
Update Software FSU
SECURITY Features integrated in MCUs TC2xx TC3xx /2 .G
Integrity & Safety
CRC calculation unit X X
PowerSupply integrity monitoring X X
Read While Write (X) 1a (X) 1b
Clock Security System (CSS) X X
Error Correction Code (ECC) X X
Parity check X X
Temperature Sensor X X
Watchdogs X X
Crypto HW
Random Number Generator (RNG) X X
Hashing Functions & HMAC X SHA 2
Symmetric Cryptography X X
Cryptro SW
Random Number Generator (RNG) X from third party
Hashing Functions & HMAC from third party
Symmetric Cryptography X from third party
Asymmetric Cryptography from third party
Tamper Protection
Anti Tamper X X
Backup Domain X 3a
RTC (alarm timestamp) X 3b
RTC Register protection X 4
Backup registers X
GPIO configuration locking (X) (X) 5
Debug Lock Level JTAG or SWD X X
Privileges Permis-
sion Management
Memory Protection Unit (MPU) X X
Firewall X 6 X 6
Memory Protection
Read Protection (RDP) – HSM RAM X X
Write protection (WRP) X X
Proprietary Code Protection (PCROP) X 7 X 7
Mass Erase not specified not specified
Traceability Device electronic 96 bit Unique ID X X
Secure Firmware
Update Software FSU from third party from third party
Security Features for Automotive & Industrial PurposeSecurity Features at a Glance – STMicroelectronics SPC5x Family
Data Processing
Microcontroller
Notes for Aurix
1a) READ PFlash while WRITE DFlash , not for READ while Write inside PFlash
1b) READ PFlash while WRITE DFlash and READ PFlash while WRITE PFlash for SOTA
on bank granularity.
2) Feature available in regard to SHA
3a) Standby controller w. 8 bit processor and Standby RAMs available in TC3xx,
NOT in TC2xx
3b) Standby controller contains RTC
4) Standby controller executes its own image
5) GPIO configuration is protected with safety measures (e.g. ACCEN, ENDINIT)
6) Bridge module in HSM can be understood as Firewall functionality
7) Exclusive flag applicable on HSM code and other protection layers –
a Proprietary Code protection feature (PCROP)
Production Line SPC56 SPC57 SPC58
Nick Name Bolero Lavaredo K2 Velvety/Sphaero Chorus 1M Chorus 2M /4M/6M Eiger/Bernina
Evita Level Light Medium Medium
HSM Block X X
Cryptographic Coprocessor CSE C3 C3
ROM Keys Needed Not needed Not needed Not needed Not needed Needed Needed
Device Life Cycle X X X X X X
Test Life Cycle X X X X X X
Boot BAM BAF BAF BAF/Cust. BAF BAF BAF
HSM exclusive + alternative
Interface X X
Censorship1 X X X X X X X
Pass Module X X X X X X
TDM Module X X X X
Sealing X X X X X X
CAN/Flexibility clock jitter/
disable X X X
Retest Password X X X X X X
eFuse X X
Secure System Configuration X X X X X X X
Production Disable X X X X X X
Security vs. Testability X X X X X X
Security Concept – SPC5x Series
Notes
Censorship External access protection and read protection of Flash region
ROM key During the production test, ST generates two 128-bits random numbers and stores them into two fixed locations of the “UTest”.
When the device is shipped to the customers, these locations are not-readable by any system master.
In case they are read, the bus transfer returns an all-0 result. More details on request.
BAM Boot assist Module – for initialization of boot code
BAF Boot assist Flash – for initialization of boot code
Pass Module Used for READ / WRITE protection of FLASH memory in case of „OEM Production“. Activation in case of „OEM life cyle“ has be started.
Five passwords need to be defined by the user before. More details on request.
TDM Module Tamper Detection Module: Diary / signature to track the ERASE operation. The user is forced to create diary / signature before erasing specific Flash blocks.
82 83| |
CMs have access to customer IP and large quantities of the com-
ponents they are contracted to produce. It is essential that the
original owner of the IP controls their IP and the production vol-
ume. Flasher SECURE does both. To prevent counterfeit devices,
the Flasher reads out a unique ID from the system which it is
going to program. This ID is sent to a server that is under physical
control of the IP owner. This server validates the ID and deter-
mines whether a programming run is allowed. In this case, a
signature is generated for the device. The signature is sent back
to the Flasher which stores the signature inside the target device
it programs.
This method of secure programming is also in the best interest
of the CM. The CM can now boast that the production floor will
protect the customers IP.
Firmware running on the system, or an external application com-
municating with the system, can now verify that the system is
genuine. With an additional signature for the firmware, the boot-
loader in the system can also verify that the firmware is genuine
and unmodified. If any of the above verification fails, the device
stops working. As each signature is unique for each device, it is
not possible to create a non-approved system by simply copying
the firmware.
The signature generation uses a proven asymmetric algorithm
where the private key is not accessible by anyone but the IP owner.
This prevents attackers from forging a signature for a given ID.
All communication between Flasher and server is encrypted and
authenticated by a secure SSL/TLS connection to prevent unau-
thorized access. All actions are logged and accessible through an
Security of In-Circuit-Programmer for Off-Site Production
For high volume production it is common to employ a contract manufacturer (CM). This setup introduces a new threat for the intel-
lectual property (IP) of the original owner. To limit the risk of IP theft and overproduction, SEGGER announces the new production
programming system Flasher SECURE.
administration interface to provide as much transparency to the
IP owner as possible. Small series and mass production environ-
ments benefit from the reliability and performance of SEGGER’s
in-circuit-programming solution. SEGGER’s production pro-
grammers are designed with multiple interfaces, making them
easy to integrate into any production environment. In mass pro-
duction environments, ATE or other production control units
can easily access the Flasher for programming including serial
numbers and patch data.
100% transparency & security in manufacturing management
enables full control and visibility online about all CM activities:
■ Account management
■ Administration
■ User
■ Contract manufacturers
■ Firmware management
■ Firmware binary
■ Signature key management
■ Project management
■ Manufactured volume
■ Contract manufacturer
■ Production recording
■ Logging of programming records
■ Report of failed programming tries
As soon as production reaches a certain volume, contract manu-
facturing is a serious option. Most companies are hesitant to take
that route as it introduces a risk to their intellectual property.
Proper application of security systems, such as Flasher SECURE,
enable these companies to access the next level with confidence.
Data Processing
84 |
bad res
olution
– pdfs
or
vector
graphic
availab
le
Smartphone TV Audio User Devices
Shop
Anonymity Service
Ultrasonic
beacons
Adversary Adversary Adversary
Ultrasonic
beacons
Ultrasonic
beacons
Ultrasonic
beacons Proximity to shop
Website visit
www
Media Tracking Cross-Device Tracking Location Tracking
Adversary
Deanonymization
The picture shows the different use cases of ultrasonic beaconing technology
The picture shows that the speaker is per-
fect for voice and environmental music, but
suppressing the frequencies of critical data
protection in the range close to 20 kHz.
2nd order Butterworth (12 dB/Octave) 3rd Order Butterworth (18 dB/Octave)
Actually the main use case is to send personalized advertisements
to public displays if a user is close. This kind of marketing can
be discussed in a very controversial way of course. We want to
make you aware about another scenario: a manufacturer of vend-
ing machines, video walls or other public electronic equipment
containing a loudspeaker is a potential victim to become infiltrated
by 3rd parties with this kind of software code – similar to the use
case of DDoS-Attacks, your devices could also be used to send out
ultrasonic audio signals to the purpose of others.
How to prevent this scenario? Of course you should take care that
nobody can install such a software on your devices. For this you
should use a mainboard with TPM and a supporting operation sys-
tem, as well as security software to detect malware with a frequent
update process. Nevertheless you can only be on the safe side if you
prevent the emitting of such 18 kHz-20 kHz audio signals over the
loudspeaker. Considering cost and complexity we recommend to
start by building at least a 12 dB/Octave 2nd grade Butterworth
filter directly connected to the speaker or – in case you use a sepa-
rate amplifier – before the amplifier. In any case it should not be
a digital filter in the same silicon where the beaconing code could
be processed:
2nd order Butterworth (12 dB/Octave)
If you are using a 4 Ω speaker and you want a cut-off frequency
of 18 kHz, then you should use L2 = 0.05 mH and C2 = 1.56 µF.
If you are using a 8 Ω speaker, please choose L2 = 0.1 mH and
C2 = 0.78 µF.
To be more on the safe side, you can also try to set up the cut-off
frequency to 12 kHz to reach a much lower signal at the critical
18 kHz. Therefore you can try L2 = 0.075 mH and C2 = 2.34 µF at
a 4 Ω speaker, or L2 = 0.15 mH and C2 = 1.17 µF at a 8 Ω speaker.
The impedance of speaker chassis is rising at higher frequen-
cies and is not stable or linear, so the fine tuning should be done
in your individual design. Nevertheless the suggested values
give you a good starting point. Here is another example to get a
sharper split of amplified and not amplified frequencies, but it will
increase your bill of material:
New Trend to Worry About: Ultrasonic Beaconing
There are already some hundred smartphone apps in the stores which contain ultrasonic beaconing software. If the app has the right to
use the microphone of the smartphone, than it will listen in the background to audio codes in the range of 18 kHz-20 kHz, which cannot
be heard by humans. This audio spy technology can be used to track the consumed media or to identify the people within the same room
by cross-device tracking. Even more dangerous is the functionality to de-anonymize users and to detect their position.
3rd Order Butterworth (18 dB/Octave)
If you are using a 4 Ω speaker and you want a cut-off frequency of
18 kHz, then you should use L2 = 0.05304 mH, L3 = 0.01768 mH,
C3 = 2.94722 µF.
For these capacities we recommend the MKP10 series from man-
ufacturer WIMA. They are made for audio requirements up to
250 V. Some examples to order at Rutronik are the order codes
KFO9094 for 1 µF, KFO8627 for 1.5 µF, KFO9244 for 2.2 µF,
KFO9245 for 3.3 µF. Do not hesitate to ask for the order codes of
other specifications.
Parallel to the filtering of playing these frequencies, you can also
use a speaker made to avoid playing these ultrasonic beaconing
signals. The PUI Audio AS09208AR-R is a wideband speaker with
a frequency range of 90 Hz up to 15 kHz. The speaker has an
impedance of 8 Ω and can be connected to a 10 W RMS (15 W
music) amplifier. The industrial quality ensures an operational
temperature range f -20°C up to 60°C, which is good enough
for most places of public vending machines or video walls for
example.
IoT Connected Applications with Speakers
Public Loudspeakers
86 87| |
bad res
olution
– pdfs
or
vector
graphic
availab
le
Type BF6667A BF6637B BF6627A BF6638A BF6628A BF6618A
Typical Application Back or front of phone Front or side of the phone
Module Solution Plastic package + Coating
Plastic package +
Coating/Cover
Plastic package +
Cover
Plastic package +
Coating
Plastic package +
Cover Under-glass
Covering Thickness 50 µm 100 µm 175 µm 100 µm 175 µm 275 µm
Sensor Area 4.8 mm x 4.8 mm 6.4 mm x 3.3 mm
Sensor Array 96 x 96 128 x 66
Key No support Support
Ring Support No ring solution
VCC 2.8 to 3.3 V
IOVCC 1.8 V / VCC
Interface SPI (Typical 8 MHz)
Fingerprint Detection 15 mA @ 30 Hz 15 mA @ 15 Hz 15 mA @ 10 Hz 15 mA @ 15 Hz 15 mA @ 10 Hz 15 mA @ 10 Hz
Finger Detection 100 µA @ 20Hz 100 µA @ 20 Hz
Sleep Mode 20 µA 20 µA
FRR <1/100 <1/100
FAR <1/200,000 <1/200,000
Fingerprint Acquisition Time <50 mS <50 mS
System Response Time <150 mS <150 mS
Avoiding Visual Spy on Displays
Security is also an important topic in the field of visualization.
Taking the easy example of an ATM, the person who is in front of
the display needs to have the full view and control of his action.
The viewing angle of the TFT must be designed in the way that
only the user can see the proceedings on the screen. All the other
persons next to the user are of course not allowed to see the trans-
actions which are happening at that moment. So therefore the dis-
play-designers need to guarantee a restrictive viewing angle for the
security of the user.
Displays are made of a front glass and rear glass, backlighting, liq-
uid cristals and polarizers.
The viewing angles of a display are related to the rubbing angle of
the LCD masking within the production. The rubbing angle itself is
the trace that guides the flow of the liquid crystal inside the display
to reveal the expected view.
The polarizer can be produced in a way to influence the viewing
angles through his structure on the surface. Another security
point in our ATM example is the fact that the user wants to quit
the application without leaving any traces of finger prints on the
screen. That could make a ”review” of the PIN input possible.
Therefore many displays use a touchscreen with an anti-finger-
print function.
Most smartphones have the AFP (Anti Finger Print) included. This
special coating of the display glass or cover glass avoids traces of
dust, scratches and the finger print itself.
Such applications are in the most cases semicustom-made display
solutions and are offered by our display suppliers Yeebo, Tianma,
URT and Displaytech. The Rutronik Embedded display team can
help you building up your display with your specific viewing angel
parameters and anti-finger-print cover for a save use in the field.
Avoiding Visual and Printed Spy on Keyboards and
Number Pads
If a user has to type in a password on a keyboard or a pin-code on
a number pad, the input can be observed by Outsiders. To avoid
such lack in security we recommend using a biometrical sensor
to ensure the identity of an authorized user.
Fingerprint Solutions from BYD
Fingerprint IC Features
■ Product line is complete, can be used for mobile phone back,
front and side
■ Perfect industrial chain layout, has a good capacity to support
■ Package support cutting, mobile ID design more flexible
■ Support different module structure, such as
■ "Plastic package + Coating"
■ "Plastic package + Cover" and
■ "Under-glass"
Avoiding Visual and Printed Spying on Displays, Keyboards and Number Pads
All the digital high tech security mechanisms are useless when it comes to social engineering. If somebody wants to spy your pin-
code, password or personal data on a screen, all the security on data transmission, data storage and data processing are obsolete.
Social Engineering
■ Use unique patented "synchronous excitation" capacitance
detection scheme, no need for metal ring, single chip
implementation, cost-effective
■ Own software algorithm, without authorization fee, with
ultra low FAR and FRR, the user experience is better
■ For different hardware platforms and software systems , have
mature development experience and production experience,
technical support efficiency is high
88 89| |
Reliable Protection of Devices Thanks to Infrared Iris Scanning and Facial Recognition from Osram
Secure data transfer is possible thanks to high tech from Osram.
Banking apps on smartphones, business e-mails on your laptop,
and online shopping on your tablet – our mobile companions
need powerful protection against unauthorized access. Special
infrared LEDs from Osram Opto Semiconductors provide the
basis for reliable iris and face recognition even on mobile devices.
The OSLUX and SYNIOS family are used for any kind of access
control.
Iris scans and facial recognition are among the most reliable
biometric identification methods and are difficult to fool. Both
methods require special infrared LEDs in order to provide reli-
able protection for mobile devices. Osram Opto Semiconductors
is a technology leader in this field. Two years ago, the company
was the first to launch an infrared LED that brought iris scanners
to smartphones and other mobile devices.
Infrared Iris Scanning
Essentially, iris scanners illuminate the eyes with infrared light
and a camera takes a picture. Special software then analyzes the
picture to detect the iris pattern, which is unique to each indi-
vidual. After rolling out its first infrared LED for iris scanners
in mobile devices, Osram added a version with a slightly angled
direction of emission, which aligns with the camera’s field of view.
The latest infrared LED, the Oslux SFH 4787S, is a new version
that enables the iris to be illuminated even more uniformly.
Social Engineering
This third-generation Osram IRED for iris recognition meets
another need in this application: the brightness differences in the
camera images should ideally only originate from the iris pattern
and not be additionally caused by a gradient in the illumination.
This would mean that the software needs to correct fewer artefacts
when determining the iris pattern. With the SFH 4787S, Osram has
thus developed an emitter with a flat light, optimizing the reflector
and lens to ensure virtually constant intensity across the emitted
light beam.
Apart from this, the SFH 4787S is almost identical to its predeces-
sor, the SFH 4786S. Both are based on the compact 3.5 x 3.5 x 1.6
millimeter large Oslux package. A wavelength of 810 nanometers
(nm) delivers high-contrast images for all eye colors. The emission
direction is tilted by 8°, while the emission angle is ±18°. The optical
output of this highly efficient emitter is 720 milliwatts (mW) at a
current of 1 amp, with a radiant intensity of 1,000 milliwatts per
steradian (mW/sr).
Products for Secure Iris Recognition
SFH 4787S , SFH 4786S and SFH 4780S
Facial Recognition
Sensor systems for facial recognition record the user’s face and
detect typical features independent of facial expressions. How-
ever, to identify these features accurately and reliably, the software
requires high-quality images. This means illuminating the face
brightly and evenly, without shadows – and for this method to
protect laptops and tablets, it also has to work in a wide variety of
lighting conditions. The solution is to illuminate the face also with
infrared light. Facial recognition is considered a highly secure
form of biometric identification. The system records the user’s
face and detects typical features independent of facial expressions.
However, to identify these features accurately and reliably, the
software requires high-quality images. This means illuminat-
ing the face brightly and evenly, without shadows – and for this
method to safeguard laptops and tablets, it also has to work
in a wide variety of lighting conditions. The solution lies in
additional illumination of the face with infrared light.
The SFH 4770S is Osram's most compact infrared LED (IRED)
in the high-power class. Its low height is of particular benefit in
smartphones and tablets. The high optical output of typically
1800 mW @1.5A and broad emission characteristics make this
IRED ideal for facial recognition and eye-tracking systems which
can activate applications in response to blinking instead of the
usual double-click.
The basis for the new record emitter is the SYNIOS package which
Osram introduced some time ago for LEDs in the visible spectral
range for automotive applications. The package is extremely
compact, measuring only 2.7 mm x 2.0 mm x 0.6 mm, and offers
optimum light extraction. The SFH 4770S is the first component in
which this package has been used for infrared emitters. Installed in
the IRED is a 1 mm2 emitter chip with a wavelength of 850 nano-
meters (nm) in which two emission centers are provided with the
aid of nanostack technology. Overall, the component delivers a
typical optical output of 1800 mW @ 1.5 A with only one chip.
Products for Facial Recognition
Osram SFH 4770S and SFH 4716AS
SFH 4770S
Avoiding
Visual and Printed Spying on
Displays, Keyboards and
Number Pads
SFH 4787S
SFH 4787S
SFH 4786S
Hello MrS.
Jane Doe
90 91| |
Function Dimension
Horizontal detection area (angle of view) 50 deg: 54°±3°; 90 deg: 94°±5°
Vertical detection area (angle of view) 50 deg: 41°±3°, 90 deg: 76°±5°
Detection distance (differs per function) 3.2 –16.7 m (HVC-P2 50 deg), 1.6 – 8.6 m (HVC-P2 90 deg)
Dimensions (W x L x H)
45 x 45 x 8.2 mm (main board for both types)
25 x 25 x 8.7 mm (camera board 50 deg type)
25 x 25 x 15.7 mm (camera board 90 deg type)
Function Results
Face detection, body detection, hand detection Result count (max: 35), center coordinates (X & Y), detection size (pixel), degree of confidence
Face direction estimation Yaw degree, pitch degree, roll degree, degree of confidence
Gaze estimation Yaw degree, pitch degree
Blink estimation Blink degree (left-side eye/right-side eye)
Age estimation Age, degree of confidence
Gender estimation Gender, degree of confidence
Expression estimation
5 expressions:
“neutral”, “happiness”, “surprise”, “anger”, “sadness” and their
respective score, expression degree (positive/negative)
Face recognition Individual recognition result, score
Image output Choose one: none, 160 × 120 pixels, 320 × 240 pixels Image format: 8 bit Y data
Human Vision Components (HVC-P2)
HVC incorporates different image sensing functions like face recognition in an easy-to-mount and compact format to provide image
sensing capability to various devices.
Workplace
■ AC units targeting people
■ Lights targeting only people
■ Hands free machine operation
■ Doors opening to registered
people
Home
■ Home appliances matching
movement of people
■ AC units targeting people
■ Robots matching people
■ Lights targeting only people
Outdoors
■ Estimate interest and
purchase behavior of people
to store goods of interest
■ Vending machines recom-
mending drinks to people
Features
■ Camera module angle of view: 2 models (50 deg. and 90 deg.)
available
■ Multiple Functions (10 functions): Body Detection,
Face Detection, Hand Detection, Face Direction Estimation,
Gaze Estimation, Blink Estimation, Age Estimation, Gender
Estimation, Expression Estimation and Face Recognition
■ User friendly: easy implementation through UART or USB
Specifications
Social Engineering
Avoiding
Visual and Printed Spying
on Displays, Keyboards and
Number Pads
Female - 27 years
Applicable for:
Combine Technologies
Realize EMBEDDED Designs
Boards &
Systems
Wireless Displays Storage
RUTRONIK EMBEDDED brings together entire solutions to build applications for:
Digital Signage Transportation Industrial Control Medical
More information: www .rutronik .com/embedded
[email protected] | Tel. +49 (0) 7231 801 - 1776
92 93|
Secure Entry System Based on RFID Security
Rutronik can offer a wide range of ready to use access control systems including turnstiles. The RFID reader system is already integrated
and is being managed via TCP/IP. Our range of RFID identity cards, wristbands and key fobs as well as our servers from Advantech or
Fujitsu can complete the whole application of a secure entry system using RFID authentication. It is safer than a pin code, because a RFID
transponder cannot be copied or spied out like a pin code. Only the risk of losing the transponder or theft is given. We recommend to
discuss the individual compilation of components with our product specialists.
Social Engineering
Secure Entry Systems
A secure access to sensitive areas is the first barrier to prevent damage, theft and unauthorized operat-
ings. An entry system has very often used a pin code terminal, because it was the simplest way to grant
access. A pin code is the easiest barrier to hack, so we recommend other solutions:
Secure Entry System Based on 3D Face Recognition by Video Technology
Combining a turnstile with biometrical sensor technology is the safest solution. One of our latest high tech sensors is the Intel® RealSense™
Technology. This is a collection of hardware and software capabilities that allows you to interact with a device in a non-traditional man-
ner and enables you to develop highly interactive applications or solutions.
There are three combined cameras that act like one:
■ a 1080p HD camera
■ an infrared camera
■ an infrared laser projector
allowing them like the human eye to sense depth and track
human motion.
Intel® RealSense™ technology redefines how we interact with our
devices for a more natural, intuitive and immersive experience,
supported by the powerful performance of Intel® processors.
The infrared projector projects an infrared grid onto the scene and
the included infrared camera records the reflection on surfaces to
compute the depth information and combine it with the recorded
2D camera record. With the integrated microphone array it is pos-
sible to localize sound sources in the space and perform background
noise cancellation. With Intel® RealSense™ Software Development
Kit and RealSense™ modules, you can create compelling, exciting
applications in a variety of application areas, or you can just buy
needed modules and cables seperatly. Face recognition, which is
needed to build a secure entry system, is already available in the
SDK to allow a quick time to market.
®
94 95| |
ZigBee
Text kü
rzen
R1
2
EN
G
|
KN
A
| S
pe
ci
fic
at
io
ns
s
ub
je
ct
to
c
ha
ng
e
w
ith
ou
t n
ot
ic
e.
Pl
ea
se
n
ot
e,
th
er
e
co
ul
d
be
s
om
e
lim
ita
tio
ns
fo
r
so
m
e
fr
an
ch
is
ed
p
ro
du
ct
li
ne
s
in
s
ev
er
al
c
ou
nt
rie
s.
F
or
m
or
e
in
fo
rm
at
io
n,
p
le
as
e
co
nt
ac
t o
ur
s
al
es
te
am
.
Germany – Headquarters
Rutronik Elektronische Bauelemente GmbH | Industriestraße 2 | 75228 Ispringen / Pforzheim
Tel. +49 7231 801-0 | Fax +49 7231 82282 | E-Mail: [email protected] | www.rutronik.com
Berlin
Justus-von-Liebig-Straße 7
12489 Berlin
Tel. +49 30 8 09 27 16-0
Dresden
Radeburger Straße 172
01109 Dresden
Tel. +49 351 20 53 30-0
Erfurt
Flughafenstraße 4
99092 Erfurt
Tel. +49 361 2 28 36-30
Frankfurt
Frankfurter Straße 151 c
63303 Dreieich
Tel. +49 6103 2 70 03-0
Freiburg
Basler Landstraße 8
79111 Freiburg
Tel. +49 761 61 16 77-0
Hamburg
Neue Gröningerstraße 10
20457 Hamburg
Tel. +49 40 3 59 60 06-20
Hannover
Rendsburger Straße 32
30659 Hannover
Tel. +49 511 228507-0
Mannheim
Amselstraße 33
68307 Mannheim
Tel. +49 621 76 21 26-0
München
Landsberger Straße 392
81241 München
Tel. +49 89 88 99 91-0
Nürnberg
Südwestpark 10/12
90449 Nürnberg
Tel. +49 911 6 88 68-0
Ostwestfalen
Brockweg 133
33332 Gütersloh
Tel. +49 5241 2 32 71-0
Ratingen
Gothaer Straße 2
40880 Ratingen
Tel. +49 2102 99 00-0
RUSOL GmbH & Co. KG
Industriestraße 2
75228 Ispringen
Tel. +49 (0) 7231 801-2910
[email protected]
www.rusol.com
Slovakia
Rutronik Elektronische
Bauelemente GmbH, o.z.
Lazovná 11
97401 Banská Bystrica
Tel. +421 48 4 72 23-00
Slovenia
Rutronik Elektronische
Bauelemente GmbH
Motnica 5, 1236 Trzin
Tel. +386 1 5 61 09 80
Spain
Rutronik España S.L.
Barcelona
C/ Marqués de Sentmenat 54 - 58,
3a Planta - 1o, 08029 Barcelona
Tel. +34 93 4 44 24 12
Madrid
C/ Santa Leonor 65,
Parque Empresarial Avalon,
Edificio A, 4a Planta, 28037 Madrid
Tel. +34 91 3 00 55 28
San Sebastián
P0 Ubarburu 39 - Polígono 27,
office 303 (Edificio Enertic),
20014 Donostia
Tel. +34 943 40 45 28
Sweden
Rutronik Nordic AB
Kista Science Tower
Färögatan 33; 16451 Kista
Tel. +46 8 50 55 49 00
Switzerland
Rutronik Elektronische
Bauelemente AG
Volketswil
Brunnenstrasse 1
8604 Volketswil
Tel. +41 44 9 47 37 37
Yverdon-les-Bains
Rue Galilée 15,
1400 Yverdon-les-Bains
Tel. +41 24 4 23 91 40
Turkey
Barbaros Mahallesi, Ardic Sokak,
Varyap Meridian G2 Blok, No.: 09
34746 Bati Atasehir, Istanbul
Tel. +49 7231 801-1751
[email protected]
United Kingdom & Ireland
Rutronik UK Ltd.
1-3 The Courtyard, Calvin Street
The Valley, Bolton
BL1 8PB, Lancashire, UK
Tel. +44 1204 363311
Swindon
Tel. +44 1793 44 1885
France
Rutronik S.A.S
6, Mail de l’Europe
78170 La Celle St Cloud
Tel. +33 1 30 08 33 00
[email protected]
Bordeaux
Tel. +33 5 57 26 40 00
Grenoble
Tel. +33 4 76 61 00 90
Le Mans
Tel. +33 2 43 78 16 97
Lyon
Tel. +33 4 72 76 80 00
Poitiers
Tel. +33 5 49 52 88 88
Rennes
Tel. +33 2 23 45 14 40
Strasbourg
Tel. +33 3 88 78 12 12
Hungary
Rutronik Magyarország Kft.
Alíz utca 1
1117 Budapest
Tel. +36 1 371 06 66
Italy
Rutronik Italia S.r.l.
21, Via Caldera
Centro Direzionale S.Siro
20153 Milano (MI)
Tel. +39 02 4 09 51-1
[email protected]
Ancona
Tel. +39 071 2 91 62 18
Bologna
Tel. +39 051 6 46 32 00
Florence
Tel. +39 055 8 82 73 32
Padua
Tel. +39 049 8 69 78 00
Rome
Tel. +39 06 228 782-1
Turin
Tel. +39 011 9 02 20 00
Lithuania
Rutronik Elektronische
Bauelemente GmbH
Raudondvario pl.76
47182 Kaunas
Tel. +370 37 26 17 80
Austria
Rutronik Elektronische
Bauelemente Ges. m. b. H.
Durisolstraße 11
4600 Wels
Tel. +43 7242 4 49 01
Belgium
Rutronik Belgium BVBA
Keppekouter 1
Ninovesteenweg 198
9320 Erembodegem-Aalst
Tel. +32 53 60 65 90
Bulgaria
Rutronik Elektronische
Bauelemente GmbH
Blvd. Nikola Vaptzarov 35
Business Center Lozenec
Floor 1, Office No 1B
1407 Sofia
Tel. +35 92 974 86 46
Czech Republic
Rutronik Elektronische
Bauelemente CZ s.r.o.
Brno
Pražákova 1008/69, 15. f loor
639 00 Brno
Tel. +420 5 4 54 24-681
Prague
Na Pankraci 1638/43
140 00 Praha 4
Tel. +420 2 33 34 31 20
Denmark
Rutronik Elektronische
Bauelemente GmbH
Herstedøstervej 27-29
2620 Albertslund
Tel. +45 7020 19 63
Estonia
Rutronik Elektronische
Bauelemente GmbH
Vaksali 17A
50410 Tartu
Tel. +372 7370951
Finland
Rutronik Elektronische
Bauelemente GmbH
Malminkaari 5
00700 Helsinki
Tel. +358 9 32 91 22 00
USA
Rutronik Inc.
Parkway Centre
2745 N. Dallas Parkway
Plano TX, 75093
Tel.: +1 216 328 8900
Mexico
Rutronik Mexico S.A. DE C.V.
Av. Armando Birlaing Shaff ler
No. 2001 Piso 8 A-II
Corp. Central Park Torre 1, Centro Sur
76090 QUERETARO, Qro.
Tel. +52 442 103 1800
China
Rutronik Electronics (Shenzhen)
Co., Ltd
Shenzhen
Room 807, Excellence Bldg.,
No. 98, Fuhua 1 Road
Futian Distr., Shenzhen
Tel. +86 755 8240 7106
Shanghai
Room 1710, Dongchen Tower
No. 60, Mudan Road
Pudong New Distr., Shanghai
Tel. +86 216 8869 910
Chengdu
Room no. 407, 4F
No. 31 Zong Fu Street
610016 Chengdu
Tel. +86 28 8651 2214
Hong Kong
Rutronik Electronics Asia HK Ltd.
Hong Kong
54/F, Hopewell Centre
183 Queens Road East, Wan Chai
Hong Kong
Tel. +852 5337 0119
Taiwan
Rutronik Electronics Asia HK Ltd.
Taipei (Taiwan representative office)
8F, No. 367, Fuxing N. Rd.,
Songshan Dist, Taipei City,
10543 Taiwan
Tel. +886 (2) 2175 2936
Thailand
Rutronik Elektronische
Bauelemente GmbH
2/1 Soi Rom Klao 25/2
Rom Klao Road, Khlongsamprawet
Ladkrabang, 10520 Bangkok
Tel. +66 2 737 6423
Netherlands
Rutronik Elektronische
Bauelemente GmbH
Takkebijsters 51a
4817BL Breda
Tel. +31 76 57 230 20
Norway
Rutronik Elektronische
Bauelemente GmbH
Olav Helsets vei 6
0694 Oslo
Tel. +47 22 76 79 20
Poland
Rutronik Polska Sp. z o.o.
ul. Bojkowska 37
44-101 Gliwice
Tel. +48 32 4 61 20 00
Gdynia
ul. Batorego 28-32
81-366 Gdynia
Tel. +48 58 7 83 20-20
Warsaw
ul. Broniewskiego 3
01-785 Warszawa
Tel. +48 22 462 70-50
Portugal
Rutronik Elektronische
Bauelemente GmbH
Av. General Humberto Delgado
Porta 8, 1ºAndar, Sala R
4760-012 V. N. Famalicão
Tel. +351 252 3 12-336
Romania
Rutronik Elektronische
Bauelemente GmbH
Martin Luther Str. no. 2, 3rd floor
300054 Timişoara
Tel. +40 25 6401240
Bucureşti
Tel. +40 21 3000141
Russia
Rutronik
Beteiligungsgesellschaft mbH
Levoberejnaya sreet 12
Hotel Soyuz, office 314
125445 Moscow
Tel. +7(499) 963 31 84
Serbia
Rutronik Elektronische
Bauelemente GmbH
Maglajska 24a
11000 Belgrade
Tel. +381 (11) 3113366
European branches: International branches:
Committed to excellence
Security Aspects - White Paper on How to Make State of the Art Electronic Designs
Rutronik Elektronische Bauelemente GmbH has produced a comprehensive white paper on security aspects that will help developers, product managers, and buyers to create secure switching and system concepts, thereby also meeting the requirements of the GDPR (General Data Protection Regulation), which becomes legally enforceable on May 25, 2018.
Latest in Home
Lotus 3-Seater Puts Driver in the Middle
September 18, 2024
Over 500 UAW Members Go on Strike at Eaton Plant in Michigan
September 18, 2024